Chapter 9. Recommended Biometric for Network Security
In the previous chapters, we explored finger, face, voice, and iris biometrics. We examined each biometric's strengths and weaknesses, and we looked at what types of algorithms are available. Also, Chapter 4 described the qualities that make a biometric technology good for network security. Now that we have examined both the biometrics that could be suitable for network access and their qualities, a recommendation of which technology to use needs to be made.
The recommendation put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here will need to be revisited. What will remain solid is the methodology used to evaluate ...
Get Biometrics for Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.