Skip to main content

Implementing Biometric Security

Implementing Biometric Security

John Chirillo, Scott Blaul

ISBN: 978-0-764-52502-5

May 2003

432 pages

Select type: Paperback

Product not available for purchase


* Biometrics authentication, which relies on fingerprints, speech, or other physical characteristics, is an increasingly important means of protecting critical data
* Gives security professionals specific guidelines, applications, and procedures for implementing a biometric security system in a LAN, WAN, or wireless infrastructure
* Covers fingerprint identification, hand geometry, speaker recognition, face location, retina scanning, and multibiometrics
* Companion Web site contains articles, papers, source code, and product guides


Chapter 1: Biometrics.

Chapter 2: Fingerprint Technology.

Chapter 3: Face Technology.

Chapter 4: Iris and Retina Vascular Pattern Technology.

Chapter 5: Other Physical Biometrics.

Chapter 6: Signature and Handwriting Technology.

Chapter 7: Voice Recognition.

Chapter 8: Keyboard/Keystroke Dynamics.

Chapter 9: Hiding Data with Passphrases.

Chapter 10: Multibiometrics and Two-Factor Authentication.

Chapter 11: Executive Decision.

Chapter 12: Biometric Solution Case Study.

Appendix A: What’s on the Web Site.


Companion Site

Visit the companion site.