Security and Access Control Using Biometric Technologies

Author:   Robert Newman
Publisher:   Cengage Learning, Inc
Edition:   New edition
ISBN:  

9781435441057


Pages:   512
Publication Date:   01 September 2009
Format:   Paperback
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Our Price $213.71 Quantity:  
Add to Cart

Share |

Security and Access Control Using Biometric Technologies


Add your own review!

Overview

Security and Access Control Using Biometric Technologies presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. The book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security. An emphasis is directed towards authentication, authorization, identification, and access control. Topics covered include security and management required to protect valuable computer and network resources and assets, and methods of providing control over access and security for computers and networks. Written for a broad level of readers, this book applies to information system and information technology students, as well as network managers, security administrators and other practitioners. Oriented towards the practical application of biometrics in the real world, Security and Access Control Using Biometric Technologies provides the reader with a realistic view of the use of biometrics in the ever-changing industry of information security.

Full Product Details

Author:   Robert Newman
Publisher:   Cengage Learning, Inc
Imprint:   Thomson Delmar Learning, Division of Thomson Learning
Edition:   New edition
Dimensions:   Width: 18.50cm , Height: 2.30cm , Length: 23.40cm
Weight:   0.726kg
ISBN:  

9781435441057


ISBN 10:   1435441052
Pages:   512
Publication Date:   01 September 2009
Audience:   College/higher education ,  Tertiary & Higher Education
Format:   Paperback
Publisher's Status:   Out of Print
Availability:   In Print   Availability explained
Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock.

Table of Contents

Reviews

Author Information

Robert C. Newman is currently a lecturer of Information Systems in the College of Information Technology at Georgia Southern University. His most previous assignment was Associate Professor of Telecommunications Management at DeVry University. Newman has a B.S. from University of Southern Carolina Columbia, and has completed graduate M.S. course work in Computer Science at University of Alabama He started his career at the University of South Carolina in the Computer Science Department, where he held a number of positions in a large computer operation, including operations manager. He has taught in the computer information technology departments in a number of colleges and universities. He is currently active in computer forensics and enterprise information systems security education and is an active speaker on these topics. Robert's professional experience includes many years in the telephone industry, in numerous positions at BellSouth and AT&T. He gathered hands-on networking knowledge in software development, broadband operations, and network management and surveillance at BellSouth. Early in his career, he developed a solid background in IBM mainframe hardware and software and business applications. Robert has been a member of federal, state, and county law enforcement agencies in Georgia, Alabama, and South Carolina. He is a graduate of the Northeast Georgia Police Academy and Georgia Post Certified (GaPOST) and a Certified Information Systems Security Professional (CISSP). He is an active member of the FBI's Coastal Empire Infragard Organization. He has accumulated a wealth of knowledge concerning the security and protection of data and computer resources and network administration. Security lectures are part of the Network Administration, Management Information Systems, Computer Forensics, and Data Communications courses currently taught by the author. He is a published author of three college-level Security books.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List