The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site
Add your own book

Book details of 'Biometrics for Network Security'

Cover of Biometrics for Network Security
TitleBiometrics for Network Security
Author(s)Paul Reid
PublishedNovember 2003
PublisherPrentice Hall PTR
Web links for this book
Search at
Wikipedia booksources
Shop for this book

Back to shelf Computer security info for Biometrics for Network Security

Score: score: 2.0 **---  Vote for this book

The Virtual Bookcase Reviews of 'Biometrics for Network Security':

Reviewer Rob Slade wrote:
In the preface, Reid presents biometrics as the cure for all network security ills. Given his employment, with a company that sells biometric systems, this enthusiasm is understandable, if not totally compelling. Part one deals with introduction and background. Chapter one is the introduction--mostly to the book. The definition of biometrics itself is very terse. Authentication technologies are promised in chapter two--which starts out by repeating the all-too-common error of confusing authentication with identification. Reid then pooh-poohs passwords and tokens and praises biometrics as strong authentication, without dealing with the fact that a biometric is the ultimate static password, or addressing the technologies (and associated error rates) needed to make biometrics a viable authentication factor. Privacy is confused with intellectual property, access control, and improper employee monitoring in chapter three. Part two lists biometric technologies. Chapter four is a disorganized amalgam of factors generally involved in biometric use and applications. Fingerprint features are reviewed in chapter five with incomprehensible explanations and unclear illustrations. Attacks against fingerprint technologies and systems are raised--but are usually dismissed in a fairly cavalier manner. Similar examinations are made of face (chapter six), voice (seven), and iris (eight) systems. Part three looks at implementing the technologies for network applications. Chapter nine compares the four biometrics from part two, in general terms, and states measures that are rather at odds with other biometric literature. Reid makes a big deal out of simple error rate metrics in chapter ten. Most of chapter eleven talks about hardening biometric devices and hardware. Unconvincing fictional "straw man" case studies and some general project planning topics are in chapter twelve, with more of the same in thirteen and fourteen. Part five, which is only chapter fifteen, casts a rosy-spectacled look at the future when all of security will be made perfect through the use of biometrics--essentially returning us to the preface. Basically, this appears to be a promotional pamphlet padded out to book length: it isn't even as good as Richards' article in the "Information Security Management Handbook" . The material will not help you with a realistic assessment of what biometrics can (and cannot) do, or how to implement it. The "Biometrics" text by Woodward, Orlans and Higgins (see reviews) is far superior. copyright Robert M. Slade, 2004

Add my review for Biometrics for Network Security
Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail
Site credits
Copyright © 2000-2018 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement