00920nam a2200253 i 450099100100844970753620020502182338.0970804s1995 it ||| | ita 8820481804b11450629-39ule_instPRUMB53392ExLDip. SSSCitaHorn, Sam526789Concentrazione :come apprendere il metodo per riuscire con successo nello studio e nel lavoro /Sam HornMilano :Angeli,1995120 p. ;22 cm.Trend. Le guide in un mondo che cambia ;64Personalità - Sviluppo.b1145062901-03-1701-07-02991001008449707536LE021 DI1BISA9012021000004933le021-E0.00-l- 00000.i1163701801-07-02Concentrazione820329UNISALENTOle02101-01-97ma -itait 0103175nam 2200613 450 991082339190332120230125182541.01-60807-018-2(CKB)2670000000133266(EBL)829297(OCoLC)769343996(SSID)ssj0000652455(PQKBManifestationID)12260434(PQKBTitleCode)TC0000652455(PQKBWorkID)10642595(PQKB)11236085(Au-PeEL)EBL829297(CaPaEBR)ebr10522164(CaBNVSL)mat09100850(IEEE)9100850(MiAaPQ)EBC829297(EXLCZ)99267000000013326620200729d2011 uy engur|n|---|||||txtccrBiometrics in identity management concepts to applications /Shimon K. ModiBoston :Artech House,c2011.[Piscataqay, New Jersey] :IEEE Xplore,[2011]1 online resource (278 p.)Information security and privacy seriesDescription based upon print version of record.1-60807-017-4 Includes bibliographical references and index.Ch. 1. Introduction -- Ch. 2. Fundamentals of technical evaluations -- Ch. 3. Fingerprint recognition -- Ch. 4. Face recognition -- Ch. 5. Iris recognition -- Ch. 6. Hand geometry recognition -- Ch. 7. Speaker recognition -- Ch. 8. Vascular pattern recognition -- Ch. 9. Dynamic signature verification -- Ch. 10. Keystroke dynamics, retina, DNA, and gait recognition -- Ch. 11. Multibiometric systems -- Ch. 12. Biometric standards -- Ch. 13. Biometric testing and evaluation programs -- Ch. 14. Designing and deploying biometric systems -- Ch. 15. Biometric system security -- Ch. 16. Privacy concerns in biometric applications.In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are nowArtech House information security and privacy series.Biometric identificationBiometric identificationTechnological innovationsIdentificationData processingBiometric identification.Biometric identificationTechnological innovations.IdentificationData processing.570.191950285Modi Shimon K.1602948CaBNVSLCaBNVSLCaBNVSLBOOK9910823391903321Biometrics in identity management3927102UNINA