Search alternatives:
"biometric" » "biometrics", "geometric", "biometry"

1
by Reid, Paul
Published 2003
Pearson
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

2
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

3
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ...Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric...

4
by Familiar, Bob
Published 2015
Apress, Springer
Table of Contents: ... Analytics Queries; Real-Time Notifications; Biometrics Alarm Worker; Testing Push Notifications; Real-Time...

5
by Lehtinen, Rick
Published 2006
O'Reilly
Table of Contents: ... vulnerabilities -- Encryption -- Communications and network security -- Physical security and biometrics...

6 Table of Contents: ...: Nonce-Free Hash Generation in Blockchain -- 5. Password Authentication Using Keystroke Biometric -- 6...

7
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ..., N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes...

8
by Rouse, William B.
Published 2010
Wiley
Table of Contents: ... an Automotive Production Facility; 14. How Behavioral and Biometric Health Risk Factors Can Predict Medical...

9
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ...: passwords, biometrics, and digital signatures -- Digital identification II: digital certificates, CAs...

10
by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Published 2023
Packt Publishing Ltd.
Table of Contents: ... factors -- Possession factors -- Biometric factors -- Authenticators and enrollment -- Knowledge factors...

11
by Beasley, Jeffrey S.
Published 2015
Pearson IT Certification
... with RIPv2, OSPF, EIGRP, and IS-IS; physical security, access control, and biometric access control; cloud...

12
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... of workplace surveillance -- How cell phones can be hacked -- How Biometrics works -- How Radio Frequency ID...

13
Published 2013
Wiley
Table of Contents: ... -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS...

14
Published 2023
Expanding Security

15
by Modrzyk, Nicolas
Published 2020
APress

16
by Waschke, Marvin
Published 2017
Apress
... the adoption of newer forms of biometric authentication affects you ; Stop your router and other online devices...

17 Table of Contents: ...Account Policies -- Authorization -- Identity -- Authentication Methods -- Biometric Factors...

18
by Andress, Jason
Published 2014
Syngress
Table of Contents: ...Mutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics...

19
by Grimes, Roger A.
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Connection Devices -- Wireless -- Phone-Based -- Voice Authentication -- Phone Apps -- SMS -- Biometrics...

20
by Krief, Francine
Published 2010
ISTE
Table of Contents: ... systems; 4.2.1. Barcodes; 4.2.2. Optical character recognition (OCR) systems; 4.2.3. Biometric...