Biometrics for network security
The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the...
Autor Corporativo: | Safari Tech Books Online (-) |
---|---|
Otros Autores: | Reid, Paul Author (author) |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified]
Prentice Hall PTR
2004
|
Edición: | 1st edition |
Colección: | Prentice Hall series in computer networking and distributed systems
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009626957906719 |
Ejemplares similares
Ejemplares similares
-
Iris biometric model for secured network access
Publicado: (2013) -
New trends and developments in biometrics
Publicado: (2012) -
Network security hacks
Publicado: (2004) -
Network Security Architectures
Publicado: (2004) -
Network security fundamentals
Publicado: (2005)