Search alternatives:
"biometric" » "biometrics", "biometry"

1
by Reid, Paul
Published 2003
Pearson
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

2
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Biometric identification / http://id.loc.gov/authorities/subjects/sh2001010964...

3
by Farin, Gerald E.
Published 2002
North Holland
Table of Contents: ...A history of curves and surfaces in CAGD /G. Farin -- Geometric fundamentals /W. Boehm and H...

4
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ...Password Authentication -- Computer and Network Authentication -- Antivirus Technology -- Biometric...

5
by Familiar, Bob
Published 2015
Apress, Springer
Table of Contents: ... Analytics Queries; Real-Time Notifications; Biometrics Alarm Worker; Testing Push Notifications; Real-Time...

6
by Lehtinen, Rick
Published 2006
O'Reilly
Table of Contents: ... vulnerabilities -- Encryption -- Communications and network security -- Physical security and biometrics...

7 Table of Contents: ...: Nonce-Free Hash Generation in Blockchain -- 5. Password Authentication Using Keystroke Biometric -- 6...

8
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ..., N Yuvaraj, NV Kousik -- A Biometric Technology-Based Framework for Tackling and Preventing Crimes...

9
by Rouse, William B.
Published 2010
Wiley
Table of Contents: ... an Automotive Production Facility; 14. How Behavioral and Biometric Health Risk Factors Can Predict Medical...

10
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ...: passwords, biometrics, and digital signatures -- Digital identification II: digital certificates, CAs...

11
by Vries, Henkjan de, Stjernlöf, Lovisa Stenbäcken
Published 2023
Packt Publishing Ltd.
Table of Contents: ... factors -- Possession factors -- Biometric factors -- Authenticators and enrollment -- Knowledge factors...

12
by Beasley, Jeffrey S.
Published 2015
Pearson IT Certification
... with RIPv2, OSPF, EIGRP, and IS-IS; physical security, access control, and biometric access control; cloud...

13
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... of workplace surveillance -- How cell phones can be hacked -- How Biometrics works -- How Radio Frequency ID...

14
Published 2013
Wiley
Table of Contents: ... -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS...

15
by Kerste, Dean
Published 2014
InfiniteSkills
... annotations, such as hole callout, geometric tolerance, and weld symbol. This video tutorial will also show...

16
by Omura, George
Published 2013
Sybex
..., and geometric constraints -Explores 3D modeling and imaging -Discusses customization and integration -Helps you...

17
Published 2023
Expanding Security

18
by Modrzyk, Nicolas
Published 2020
APress

19
by Alkin, Oktay
Published 2014
CRC Press
Table of Contents: ... of Geometric Series; Appendix D Orthogonality of Basis Functions; Appendix E Partial Fraction Expansion...

20
by Waschke, Marvin
Published 2017
Apress
... the adoption of newer forms of biometric authentication affects you ; Stop your router and other online devices...