Nelson Higher Education

Higher Education

Security and Access Control Using Biometric Technologies, 1st Edition

  • Robert Newman
  • ISBN-10: 1435441052
  • ISBN-13: 9781435441057
  • 512 Pages | Paperback
  • COPYRIGHT: 2010 Published
Request a Copy for Review


About the Product

Security and Access Control Using Biometric Technologies presents an introduction to biometrics or the study of recognizing individuals based on their unique physical or behavioral traits, as they relate to computer security. The book begins with the basics of biometric technologies and discusses how and why biometric systems are emerging in information security. An emphasis is directed towards authentication, authorization, identification, and access control. Topics covered include security and management required to protect valuable computer and network resources and assets, and methods of providing control over access and security for computers and networks. Written for a broad level of readers, this book applies to information system and information technology students, as well as network managers, security administrators and other practitioners. Oriented towards the practical application of biometrics in the real world, Security and Access Control Using Biometric Technologies provides the reader with a realistic view of the use of biometrics in the ever-changing industry of information security.


  • Presents access control techniques using biometric methods to provide protection to an organization's assets and resources and to lessen threats that are inherent on the Internet and in a networking environment.

  • Addresses security and privacy issues, which includes industry standards and legal issues, that arise from the use of biometric systems.

  • Introduces hardware and software applications that would be utilized in a biometric security environment.

  • Provides helpful tools to manage, implement and operate biometric applications.

  • Features extensive leaning aids such as Key Terms, Review Questions and Discussion Exercises that further enhance the reader's understanding of material covered. Hands-On Projects provide research activities and a progressive case project places readers in the role of security consultant.

About the Author

Robert Newman

Robert C. Newman is currently a lecturer of Information Systems in the College of Information Technology at Georgia Southern University. His most previous assignment was Associate Professor of Telecommunications Management at DeVry University. Newman has a B.S. from University of Southern Carolina Columbia, and has completed graduate M.S. course work in Computer Science at University of Alabama He started his career at the University of South Carolina in the Computer Science Department, where he held a number of positions in a large computer operation, including operations manager. He has taught in the computer information technology departments in a number of colleges and universities. He is currently active in computer forensics and enterprise information systems security education and is an active speaker on these topics. Robert's professional experience includes many years in the telephone industry, in numerous positions at BellSouth and AT&T. He gathered hands-on networking knowledge in software development, broadband operations, and network management and surveillance at BellSouth. Early in his career, he developed a solid background in IBM mainframe hardware and software and business applications. Robert has been a member of federal, state, and county law enforcement agencies in Georgia, Alabama, and South Carolina. He is a graduate of the Northeast Georgia Police Academy and Georgia Post Certified (GaPOST) and a Certified Information Systems Security Professional (CISSP). He is an active member of the FBI's Coastal Empire Infragard Organization. He has accumulated a wealth of knowledge concerning the security and protection of data and computer resources and network administration. Security lectures are part of the Network Administration, Management Information Systems, Computer Forensics, and Data Communications courses currently taught by the author. He is a published author of three college-level Security books.

Table of Contents

1. Access Control Using Biometrics.
2. Biometric Traits and Modalities.
3. Biometric Applications and Solutions.
4. Repositories for Database and Template Storage.
5. Legacy and Biometric Systems.
6. Uni-Modal, Multi-modal, and Multi-biometrics Integration.
7. Policy and Program Management.
8. Access Control Methods and Technologies.
9. System Confidentiality, Integrity, and Accessibility.
10. Security and Privacy Issues.
11. Implementation, Operation, and Management Issues.
12. Standards, Organizations, and Legal Environment.
A: Biometrics acronyms.
B: Biometrics vendors.