Cargando…

Identity Management with Biometrics

Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Unde...

Descripción completa

Detalles Bibliográficos
Autor principal: Bock, Lisa
Formato: Electrónico eBook
Idioma:Indeterminado
Publicado: [S.l.] : Packt Publishing, 2020.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1224914538
003 OCoLC
005 20231017213018.0
006 m d
007 cr |n|||||||||
008 201111s2020 xx o ||| 0 und d
040 |a VT2  |b eng  |c VT2  |d TOH  |d OCLCQ 
020 |a 9781838988388 
020 |a 1838988386 
035 |a (OCoLC)1224914538 
082 0 4 |a 570.191950285  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Bock, Lisa. 
245 1 0 |a Identity Management with Biometrics  |h [electronic resource] /  |c Lisa Bock. 
260 |a [S.l.] :  |b Packt Publishing,  |c 2020. 
300 |a 1 online resource 
500 |a Title from content provider. 
520 |a Work with common biometrics such as face, fingerprint, and iris recognition for business and personal use to ensure secure identification and authentication for fintech, homes, and computer systems Key Features Explore the next iteration of identity protection and overcome real-world challenges Understand different biometric use cases to deploy a large-scale biometric system Curated by renowned security ambassador and experienced author Lisa Bock Book Description Biometric technologies provide a variety of robust and convenient methods to securely identify and authenticate an individual. Unlike a password or smart card, biometrics can identify an attribute that is not only unique to an individual, but also eliminates any possibility of duplication. Identity Management with Biometrics is a solid introduction for anyone who wants to explore biometric techniques, such as fingerprint, iris, voice, palm print, and facial recognition. Starting with an overview of biometrics, you'll learn the various uses and applications of biometrics in fintech, buildings, border control, and many other fields. You'll understand the characteristics of an optimal biometric system and then review different types of errors and discover the benefits of multi-factor authentication. You'll also get to grips with analyzing a biometric system for usability and accuracy and understand the process of implementation, testing, and deployment, along with addressing privacy concerns. The book outlines the importance of protecting biometric data by using encryption and shows you which factors to consider and how to analyze them before investing in biometric technologies. By the end of this book, you'll be well-versed with a variety of recognition processes and be able to make the right decisions when implementing biometric technologies. What you will learn Review the advantages and disadvantages of biometric technology Understand the characteristics of an optimal biometric system Discover the uses of biometrics and where they are used Compare different types of errors and see how to tune your system Understand the benefits of multi-factor authentication Work with commonly used biometrics such as face, fingerprint, and iris Analyze a biometric system for usability and accuracy Address privacy concerns and get a glimpse of the future of biometrics Who this book is for Identity Management with Biometrics is for IT managers, security professionals, students, teachers, and anyone invo... 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781838988388/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP