* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data * Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure * Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics * Companion Web site contains articles, papers, source code, and product guidesYou can also create an eSign Card (handwritten signature templatel that will be used for verification of your signature. ... At the end of the fifth signature, you will be informed that the sign card has been successfully created. USING PALManbsp;...
|Title||:||Implementing Biometric Security|
|Author||:||John Chirillo, Scott Blaul|
|Publisher||:||Wiley - 2003-05-09|