Front Cover
McGraw-Hill/Osborne, 2003 - Computers - 432 pages
0 Reviews
Discusses the diverse types of authentication--PINs, passwords, Tokens, USB Tokens, Smart Cards, Voice, Signature, Keystroke, Iris, Fingerprint, Face, or Hand--and how to select the proper method for one's individual environment, and explains how to overcome the challenges, including privacy issues, of utilizing biometrics in an overall security design. Original. (Intermediate)

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.


Authentication and Biometrics Overview
How Authentication Technologies Work
Chapter 2 How Biometrics Work

27 other sections not shown

Other editions - View all

Common terms and phrases

References to this book

About the author (2003)

John Woodward is a senior policy analyst at RAND where he works on national security, intelligence, and technology policy issues. He is particularly interested in biometrics and surveillance technologies. He has testified about these technologies before Congress and the congressionally created Commission on Online Child Protection. Prior to joining RAND full-time in 2000, Mr. Woodward served as an Operations Officer for the Central Intelligence Agency for twelve years. His overseas assignments included tours in East Asia and East Africa. Mr. Woodward received his Juris Doctor degree magna cum laude from Georgetown University Law Center in Washington, D.C. He was a Thouron Scholar at the London School of Economics, University of London, where he received his M.S. in Economics. He received his B.S. in Economics from the Wharton School of the University of Pennsylvania. He served as a law clerk to the Hon. Roderick R. McKelvie, a U.S. District Court Judge in Wilmington, Delaware.