menu
{ "item_title" : "Fingerprint Identification and Mobile Handheld Devices", "item_author" : [" National Institute of Science and Techno "], "item_description" : "The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely.Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. This report describes using fingerprint identification on handheld devices. Two types of solutions are described: one that uses the computational capabilities of the handheld device to authenticate a user's fingerprints, the other that uses the computational capabilities of a specialized processor to offload processing by the handheld device. Details of the design and implementation of both solutions are provided.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/50/321/771/150321771X_b.jpg", "price_data" : { "retail_price" : "14.95", "online_price" : "14.95", "our_price" : "14.95", "club_price" : "14.95", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Fingerprint Identification and Mobile Handheld Devices|National Institute of Science and Techno

Fingerprint Identification and Mobile Handheld Devices : An Overview and Implementation

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

The use of mobile handheld devices within the workplace is expanding rapidly. These devices are no longer viewed as coveted gadgets for early technology adopters, but have instead become indispensable tools that offer competitive business advantages for the mobile workforce. While these devices provide productivity benefits, they also pose new risks to an organization's security by the information they contain or can access remotely.Enabling adequate user authentication is the first line of defense against unauthorized use of an unattended, lost, or stolen handheld device. This report describes using fingerprint identification on handheld devices. Two types of solutions are described: one that uses the computational capabilities of the handheld device to authenticate a user's fingerprints, the other that uses the computational capabilities of a specialized processor to offload processing by the handheld device. Details of the design and implementation of both solutions are provided.

This item is Non-Returnable

Details

  • ISBN-13: 9781503217713
  • ISBN-10: 150321771X
  • Publisher: Createspace Independent Publishing Platform
  • Publish Date: November 2014
  • Dimensions: 11.02 x 8.5 x 0.05 inches
  • Shipping Weight: 0.18 pounds
  • Page Count: 24

Related Categories

You May Also Like...

    1

BAM Customer Reviews