1
by Naït-Ali, Amine
Published 2012
ISTE
Table of Contents: ...Introduction to biometrics -- Introduction to 2D face recognition -- Facial soft biometrics...

2
by Pezzullo, John C.
Published 2013
Wiley
Subjects: ...biometrics / aat...

3
by Familiar, Bob
Published 2015
Apress, Springer
Table of Contents: ... Analytics Queries; Real-Time Notifications; Biometrics Alarm Worker; Testing Push Notifications; Real-Time...

4
by Goniwada, Shivakumar R.
Published 2024
Apress
Table of Contents: ... -- Chapter 3: Foundation of Future Digital Identity -- Chapter 4: The Rise of Biometric Systems -- Chapter 5...

5
by Ciaburro, Giuseppe, Joshi, Prateek
Published 2019
Packt Publishing
Table of Contents: ...: Biometric Face Recognition -- Chapter 12: Reinforcement Learning Techniques -- Chapter 13: Deep Neural...

6
by Gralla, Preston
Published 2006
Que Pub.
Table of Contents: ... of workplace surveillance -- How cell phones can be hacked -- How Biometrics works -- How Radio Frequency ID...

7
Published 2019
Apress
Table of Contents: ...-Centered Methods to Boost Productivity -- Chapter 14. Using Biometric Sensors to Measure Productivity...

8
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ... lifecycle; Authentication and authorization frameworks for IIoT; Password-based authentication; Biometrics...

9
by Andress, Jason
Published 2014
Syngress
Table of Contents: ...Mutual authenticationPasswords; More advanced; Biometrics; Additional resources; Characteristics...

10
Published 2015
CRC Press
Table of Contents: ... of intelligent green building project management definition; Peak mean square error indicator biometric analysis...

11
Published 2014
Wiley Blackwell
Table of Contents: ... "Policy"; The Radical Promise of Poststructuralism; The Biometric Border; Conclusion; Notes; References...

12
by Shah, Tarang
Published 2011
Apress
Table of Contents: ...ATA Ventures : Tellium, Zoosk, Biometric Imaging / MIke Hodges -- Greycroft Partners : Apple, AOL...

13 ... biometrics data) and two MSc in information security and software engineering. Stefania Loredana Nita, PhD...

14
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... Passwords Come From?; Password Threats and New Solutions; Alternatives to the "Simple" Password: Biometrics...

15
by Rao, Umesh Hodeghatta, Nayak, Umesha
Published 2014
ApressOpen, Distributed to the Book trade worldwide by Springer
Table of Contents: ... -- Badge Systems -- Biometric Access Controls -- Access Control Strategies -- Discretionary Access Control...

16
by Sanguansat, Parinya
Published 2012
IntechOpen
... of PCA in fields such as image processing, biometric, face recognition and speech processing. It also...

17
by Baleanu, Dumitru
Published 2015
IntechOpen
...The book contains six chapters. The use of the progressive regressive strategy for biometrical...

18
by Modrzyk, Nicolas
Published 2020
APress