Security risk and biometric state
Saved in:
| Main Author: | Benjamin Muller |
|---|---|
| Format: | Book |
| Published: |
2009
|
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008)
by: Shoniregun, Charles A.
Published: (2008)
Handbook of biometrics
Published: (2008)
Published: (2008)
Guide to biometrics
by: Bolle, Ruud M., et al.
Published: (2004)
by: Bolle, Ruud M., et al.
Published: (2004)
Biometrics personal identification in networked society
Published: (1999)
Published: (1999)
Biometrics concepts, methodologies, tools, and applications
Published: (2017)
Published: (2017)
Automated biometrics technologies and systems
by: Zhang lhDavid D
by: Zhang lhDavid D
Touchless fingerprint biometrics
by: Labati, Ruggero Donida, et al.
Published: (2016)
by: Labati, Ruggero Donida, et al.
Published: (2016)
Biometric authentication a machine learning approach
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
by: Kung, S. Y. (Sun Yuan)
Published: (2005)
Biometric image discrimination technologies
by: Zhang, David 1949-, et al.
Published: (2006)
by: Zhang, David 1949-, et al.
Published: (2006)
Security Risk
by: Clinton, Ed M., 1926-2006
Published: (2011)
by: Clinton, Ed M., 1926-2006
Published: (2011)
Intelligent security system using biometric solution with voice output
by: Putri Isma Ifa Ismail
Published: (2006)
by: Putri Isma Ifa Ismail
Published: (2006)
Biometrics in support of military operations lessons from the battlefield
by: Buhrow, William C.
Published: (2017)
by: Buhrow, William C.
Published: (2017)
Risk state Japan's foreign policy in an age of uncertainty
Published: (2015)
Published: (2015)
Information security risk analysis
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
The security risk assessment handbook a complete guide for performing security risk assessments
by: Landoll, Douglas J.
Published: (2010)
by: Landoll, Douglas J.
Published: (2010)
Watermarked face recognition scheme-enhancing the security while maintaining the effectiveness of biometric authentication systems
by: Mohd Rizal Mohd Isa
Published: (2016)
by: Mohd Rizal Mohd Isa
Published: (2016)
Information technology security and risk management
by: Slay
Published: (2006)
by: Slay
Published: (2006)
Pensions, social security and the privatization of risk
Published: (2009)
Published: (2009)
The Palgrave handbook of security, risk and intelligence
Published: (2017)
Published: (2017)
Risk analysis and security countermeasure selection
by: Norman, Thomas L.
Published: (2016)
by: Norman, Thomas L.
Published: (2016)
NATO, security and risk management from kosovo to Khandahar
by: Williams, Michael J.
Published: (2008)
by: Williams, Michael J.
Published: (2008)
IMPROVEMENT OF FACIAL BIOMETRIC SECURITY REQUIREMENTS APPROACH USING PARTITIONAL-BASED DIGITAL IMAGE CLUSTERING TECHNIQUE :
by: Muhammad Naim Abdullah
Published: (2022)
by: Muhammad Naim Abdullah
Published: (2022)
Securing the state
by: Omand, David
Published: (2010)
by: Omand, David
Published: (2010)
Risks reading corporate signals
by: Boyadjian lhHaig J
by: Boyadjian lhHaig J
Risk analysis, assessment and management
by: lh
by: lh
Calculated risks highly radioactive waste and homeland security
by: Rogers, Kenneth A. 1946-
Published: (2007)
by: Rogers, Kenneth A. 1946-
Published: (2007)
Risk and the law
Published: (2009)
Published: (2009)
Risk Management
by: Glen B. Alleman
by: Glen B. Alleman
The Risk Profession
by: Westlake, Donald E., 1933-
Published: (2008)
by: Westlake, Donald E., 1933-
Published: (2008)
Traders Risk
by: Aycock, Roger D., 1914-2004
Published: (2007)
by: Aycock, Roger D., 1914-2004
Published: (2007)
Risk and Insurance.
by: Oswald, T. E., Azitadoly, M. A., Nurul, A. H., Norfaeza, M. S. (2014)
by: Oswald, T. E., Azitadoly, M. A., Nurul, A. H., Norfaeza, M. S. (2014)
The Governance of Risk
Securing the state reforming the national security decisionmaking process at the Civil-Military Nexus
by: Gibson, Christopher P.
Published: (2008)
by: Gibson, Christopher P.
Published: (2008)
Asset and risk management risk oriented finance
by: Esch, Louis, et al.
Published: (2005)
by: Esch, Louis, et al.
Published: (2005)
Risk management problems & solutions
Published: (1995)
Published: (1995)
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
China's security state philosophy, evolution, and politics
by: Guo, Xuezhi 1956-
Published: (2012)
by: Guo, Xuezhi 1956-
Published: (2012)
Iceberg risk an adventure in portfolio theory
by: Osband, Kent
by: Osband, Kent
Toxicity and risk context, principles and practice
by: Illing, Paul
Published: (2001)
by: Illing, Paul
Published: (2001)
Similar Items
-
Securing biometrics applications
by: Shoniregun, Charles A.
Published: (2008) -
Handbook of biometrics
Published: (2008) -
Guide to biometrics
by: Bolle, Ruud M., et al.
Published: (2004) -
Biometrics personal identification in networked society
Published: (1999) -
Biometrics concepts, methodologies, tools, and applications
Published: (2017)


