What people are saying - Write a review
We haven't found any reviews in the usual places.
The Understanding of Security Technology and Its Applications
Design and Implementation of a NonThreatening Barrier
46 other sections not shown
Other editions - View all
access control aggressor aircraft airport algorithm analysis anonymous applications assessment attack authentication aviation security biometric cable camera campus CCTV centre punches certification service provider communication components crime cryptographic cryptosystems data warehouse database detectors developed Digital Signal Processor digital signature digital watermarking dual technology e-mail effective Eigenfaces electronic elements encryption equipment evaluation Federal Aviation Administration fence Figure filter fingerprint frequency function hash identification IEEE implemented information system installation integrity interface Internet intruder intrusion detection IPv6 method methodology module monitoring Neutralize object obtained onion router operator parameters password performance Perimitrax protocol public key quadratic functions recorded safe prime scenario screener security system security technology sensor sequence signal smart card Speaker Recognition speaker verification target techniques threat tool types verification vulnerabilities watermark zone