|Eingestellt in Kategorie:
Dieses Angebot wurde verkauft am Fr, 30. Mai um 02:18.
Biometrische Technologien und Verifikationssysteme
Verkauft
Biometrische Technologien und Verifikationssysteme
US $24,64US $24,64
Fr, 30. Mai, 14:18Fr, 30. Mai, 14:18
Ähnlichen Artikel verkaufen?

Biometrische Technologien und Verifikationssysteme

RNA TRADE
(4657)
Angemeldet als gewerblicher Verkäufer
US $24,64
Ca.CHF 19,96
Artikelzustand:
Akzeptabel
    Versand:
    Kostenlos USPS Media MailTM.
    Standort: Buford, Georgia, USA
    Lieferung:
    Lieferung zwischen Di, 17. Jun und Di, 24. Jun nach 94104 bei heutigem Zahlungseingang
    Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
    Rücknahme:
    30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
    Zahlungen:
         Diners Club

    Sicher einkaufen

    eBay-Käuferschutz
    Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
    Der Verkäufer ist für dieses Angebot verantwortlich.
    eBay-Artikelnr.:396328867947

    Artikelmerkmale

    Artikelzustand
    Akzeptabel: Buch mit deutlichen Gebrauchsspuren. Der Einband kann einige Beschädigungen aufweisen, ...
    Release Year
    2007
    Book Title
    Biometric Technologies and Verification Systems
    ISBN
    9780750679671

    Über dieses Produkt

    Product Identifiers

    Publisher
    Elsevier Science & Technology
    ISBN-10
    0750679670
    ISBN-13
    9780750679671
    eBay Product ID (ePID)
    57074655

    Product Key Features

    Number of Pages
    656 Pages
    Publication Name
    Biometric Technologies and Verification Systems
    Language
    English
    Subject
    Security / General, Life Sciences / Biology, Electronics / General
    Publication Year
    2007
    Type
    Textbook
    Subject Area
    Computers, Technology & Engineering, Science
    Author
    John R. Vacca
    Format
    Perfect

    Dimensions

    Item Height
    0.9 in
    Item Weight
    38.5 Oz
    Item Length
    9.2 in
    Item Width
    7.5 in

    Additional Product Features

    Intended Audience
    Scholarly & Professional
    LCCN
    2006-051915
    Dewey Edition
    22
    Reviews
    "This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice." "The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book." "Right from this book's introductory lines until the end, Vacca demonstrates his excellent acumen in expressing a complex subject is very accesible prose, making it easy to understand. " Security Management, Col. Kuljeet Singh, CPP, "This text would be extremely useful as a ready reference for a seasoned security professional or as a primer for a novice." "The author has struck a fine balance between the details and the big picture, and his book amply lives up to the desired purpose of the book." Security Management, Col. Kuljeet Singh, CPP
    Illustrated
    Yes
    Dewey Decimal
    006.4
    Table Of Content
    Part 1: Overview Of Biometrics Technology And Verification SystemsCHAPTER 1: What Is Biometrics?CHAPTER 2: Types Of Biometrics Technology And Verification SystemsCHAPTER 3: Biometrics Technology And Verification Systems StandardsPart 2: How Biometrics Eye Analysis Technology WorksCHAPTER 4: How Iris Pattern Recognition WorksCHAPTER 5: How Retina Pattern Recognition WorksPart 3: How Biometrics Facial Recognition Technology WorksCHAPTER 6: How Video Face Recognition WorksCHAPTER 7: How Facial Thermal Imaging In The Infrared Spectrum WorksPart 4: How Biometrics Finger Scanning Analysis Technology WorksCHAPTER 8: How Finger Image Capture WorksCHAPTER 9: How Fingerscanning Verification And Recognition WorksPart 5: How Biometrics Geometry Analysis Technology WorksCHAPTER 10: How Hand Geometry Image Technology WorksCHAPTER 11: How Finger Geometry Technology WorksPart 6: How Biometrics Verification Technology WorksCHAPTER 12: How Dynamic Signature Verification Technology WorksCHAPTER 13: How Voice Recognition Technology WorksCHAPTER 14: How Keystroke Dynamics Technology WorksCHAPTER 15: How Palm Print Pattern Recognition Technology WorksCHAPTER 16: How Vein Pattern Analysis Recognition Technology WorksCHAPTER 17: How Ear Shape Analysis Technology Works CHAPTER 18: How Body Odor And/Or Scent Analysis And Other Advanced Technology WorksCHAPTER 19: How DNA Measurement Technology WorksPart 7: How Privacy Enhanced Biometrics Based Verification/Authentication WorksCHAPTER 20: How Fingerprint Verification/Authentication Technology WorksCHAPTER 21: Vulnerable Points Of A Biometric Verification SystemCHAPTER 22: How Brute Force Attacks WorkCHAPTER 23: How Data Hiding Technology WorksCHAPTER 24: Image-Based Challenges/Response MethodsCHAPTER 25: How Cancelable Biometrics WorkPart 8: Large-Scale Implementation/Deployment Of Biometrics Technologies And Verification SystemsCHAPTER 26: Specialized Biometrics Enterprise DeploymentCHAPTER 27: How to Implement Biometrics Technology And Verification SystemsPart 9: Biometrics Solutions And Future DirectionsCHAPTER 28: How Mapping The Body Technology WorksCHAPTER 29: Selecting Biometric SolutionsCHAPTER 30: Biometric Benefits
    Synopsis
    Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in. * Contains elements such as Sidebars, Tips, Notes and URL links * Heavily illustrated with over 150 illustrations, screen captures, and photographs * Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions, Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system. Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
    LC Classification Number
    TK7882.B56V33 2007

    Artikelbeschreibung des Verkäufers

    Info zu diesem Verkäufer

    RNA TRADE

    98,9% positive Bewertungen22 Tsd. Artikel verkauft

    Mitglied seit Okt 2018
    Angemeldet als gewerblicher Verkäufer
    Best priced used items
    Shop besuchenKontakt

    Detaillierte Verkäuferbewertungen

    Durchschnitt in den letzten 12 Monaten
    Genaue Beschreibung
    4.9
    Angemessene Versandkosten
    5.0
    Lieferzeit
    5.0
    Kommunikation
    5.0

    Verkäuferbewertungen (4'935)

    Alle Bewertungen
    Positiv
    Neutral
    Negativ
      • r***t (23)- Bewertung vom Käufer.
        Letzter Monat
        Bestätigter Kauf
        Good quality, prompt delivery
      Alle Bewertungen ansehen