O'Reilly logo

Biometrics for Network Security by Paul Reid

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 9. Recommended Biometric for Network Security

In the previous chapters, we explored finger, face, voice, and iris biometrics. We examined each biometric's strengths and weaknesses, and we looked at what types of algorithms are available. Also, Chapter 4 described the qualities that make a biometric technology good for network security. Now that we have examined both the biometrics that could be suitable for network access and their qualities, a recommendation of which technology to use needs to be made.

The recommendation put forth here is made with the best technologies available at the time. As biometric technology advances, some of the analyses here will need to be revisited. What will remain solid is the methodology used to evaluate ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required