The Science of Biometrics: Security Technology for Identity Verification covers the technical aspects of iris and facial recognition, focusing primarily on the mathematical and statistical algorithms that run the verification and identification processes in these two modalities. Each chapter begins with a review of the technologies, examining how they work, their advantages and disadvantages, as well as some of their established market applications. Numerous approaches are examined. Facial recognition is much more of an emerging biometric technology than iris recognition; therefore, there are more algorithms that are currently being developed in that area. After this review, numerous applications of these two modalities are covered as well, some of which have just been commercially deployed while others are under research and development. Chapters 3 and 4 conclude with case studies to provide further application review. This book is directed to security managers, electronic security system designers, consultants, and system integrators, as well as electronic security system manufacturers working in access control and biometrics.
Many types of security technologies are currently in use, with biometrics being one of the latest and most cutting-edge forms that has been produced for mass application. Biometrics, while intriguing, is often broached with hesitation and poor understanding. Adopting Biometric Technology: Challenges and Solutions advocates increased implementation of biometric technology areas of the world where it has been least accepted, particularly in the United States. This book looks at several specific applications of biometric technology, challenging issues that have obstructed the use of biometrics in security and offering realistic solutions for increasing its worldwide utilization. It is divided into three sections, with the first discussing societal barriers against the adoption of biometric technology in security. The second section presents case studies of specific applications, such as e-passports and e-voting, that have already been implemented and could be expanded into regions where usage is low. The third section lays out a case for the general practicality and value that biometrics offers to relevant business sectors, including the benefits of implementing the currently controversial technology in place of the conventional forms of verification. While biometric technology has been poorly accepted and adopted in the United States as well as other developed nations, it is already a popular tool in developing nations in Asia, Africa, and Eastern Europe. Adopting Biometric Technology examines the societal resistance hindering the broader usage of biometrics and provides practical solutions for overcoming those barriers while showing how its increased application would be overall advantageous.
This book is about the Zero Trust Framework. Essentially, this is a methodology where the IT/Network Infrastructure of a business is segmented into smaller islands, each having its own lines of defense. This is primarily achieved through the use of Multifactor Authentication (MFA), where at least three more authentication layers are used, preferably being different from one another. Another key aspect of the Zero Trust Framework is known as Privileged Access Management (PAM). This is an area of Cybersecurity where the protection of superuser accounts, rights, and privileges must be protected at all costs from Cyberattackers. In this regard, this is where the Zero Trust Framework and PAM intertwine, especially in a Cloud-based platform, such as Microsoft Azure. However, as it has been reviewed in one of our previous books, the use of passwords is now becoming a nemesis, not only for individuals but for businesses as well. It is hoped that by combining the Zero Trust Framework with PAM, password use can be eradicated altogether, thus giving rise to a passwordless society.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems. However, given its stature, it has also become a prime target for the cyberattacker. Thus, a Zero Trust Framework is strongly needed. Deploying the Zero Trust Framework in MSFT Azure takes a closer look at the Cloud, the Zero Trust Framework, and how to deploy from both the technical and psychological perspectives.
The cybersecurity landscape is changing, for sure. For example, one of the oldest threat variants is that of phishing. It evolved in the early 1990s, but even today it is still being used as a primary threat variant and has now become much more sophisticated, covert, and stealthy in nature. For example, it can be used to launch ransomware, social engineering, and extortion attacks. The advent of Generative AI is making this much worse. For example, a cyberattacker can now use something like ChatGPT to craft the content for phishing emails that are so convincing that it is almost impossible to tell the difference between what is real and what is fake. This is also clearly evident in the use of deepfakes, where fake images of real people are replicated to create videos to lure unsuspecting victims to a fake website. But Generative AI can also be used for the good to combat Phishing Attacks. This is the topic of this book. In this, we cover the following: A review of phishing A review of AI, Neural Networks, and Machine Learning A review of Natural Language Processing, Generative AI, and the Digital Person A proposed solution as to how Generative AI can combat phishing attacks as they relate to Privileged Access accounts
The Cybersecurity landscape is a daunting one today. It is nothing like it was 10 years ago. Now, it has become very complex, covert, dynamic, and stealthy. It has literally become a cat and mouse game, in which the Cyberattacker is still one step ahead. This is despite all of the technology that is available to us a society, which includes Artificial Intelligence (AI) and Machine Learning. Part of the other problem is that human beings are resistant to change. For example, the password is still the favored way of authenticating and authorizing an individual, but it too has shown its grave limitations. Despite the use of Password Managers, which can create long and complex passwords, people still resort to their old fashioned ways of doing things. So what is needed now is an extreme change, in which, unfortunately, people have no choice in whether or not they will participate. It is called the Zero Trust Framework, and in this methodology, absolutely nobody can be trusted in either the internal or the external environments. The mantra here is to keep verifying everybody, all the time. The Zero Trust Framework also involves the concept of segmentation, in which the IT and Network Infrastructure of a business is broken down into smaller components, much like a Subnet. Each component will have its own layer of security, and every individual must be authenticated via the use of Multifactor Authentication (MFA). In this book, we review both the concepts and mechanics behind the Zero Trust Framework. We also introduce advanced technologies into it, including the use of Biometrics, the Public Key Infrastructure, and Quantum Mechanics/Quantum Cryptography.
This book is written to get an overall idea of “dynastic politics” in India. It is always kept in mind that a citizen of India should know more about the politicians who are in the Government and form policies, etc. to take the country in the proper direction, at the same time the book should be interesting. Wherever possible, family trees are shown as well as the assets of our politicians. It was natural to start with the Nehru Gandhi family, being one of the largest and long-ruling families at the helm of all affairs. Then State-wise, the families are chosen and the account is presented. Since the volume is huge, this book is in two volumes. States are chosen alphabetically. So, even if the Nehru Gandhi family is in Volume 1, Tamil Nadu, Telangana, Uttar Pradesh, etc. are in Volume 2. Early rulers in Indian history used to handover the throne to their sons and then to the next generations for generations to come until some larger event upset the process, mostly conspiracies by persons like very close aides of the king or a revolt. Similar lines were followed even during our democracy passing on the rule to the next generation, which gave rise to dynastic rule. Indian politics has witnessed a large spectrum of politicians from various fields. Initially, it consisted mainly of leaders from the field of law. But now, we find that we have eminent personalities from the sports field, actors, actresses, superstars from the silver screen; the literary field is no exception; we have writers, poets, and so on; economists find a special place in the political arena; politics does not shun even criminals or few dacoits who then turned to politics after their surrender. Businessmen, lings or we can say princes from princely states as Britishers decided to call them are also found here. We have the learned people in politics as well as the illiterate people (angutha chhaap) who learnt to sign only after assuming office on getting elected.
Today, many businesses and corporations are moving their on premises IT Infrastructure to the Cloud. There are numerous advantages to do doing so, including on-demand service, scalability, and fixed pricing. As a result, the Cloud has become a popular target of cyber-based attacks. Although an ISP is often charged with keeping virtual infrastructure secure, it is not safe to assume this. Back-up measures must be taken. This book explains how to guard against cyber-attacks by adding another layer of protection to the most valuable data in the Cloud: customer information and trade secrets.
Due to the increase in the consumption of herbal medicine, there is a need to know which scientifically based methods are appropriate for assessing the quality of herbal medicines. Fingerprinting has emerged as a suitable technique for quality estimation. Chemical markers are used for evaluation of herbal medicines. Identification and quantification of these chemical markers are crucial for quality control of herbal medicines. This book provides updated knowledge on methodology, quality assessment, toxicity analysis and medicinal values of natural compounds.
Nanomaterials for Wastewater Remediation introduces techniques for nanoparticle formation and their benefits in environmental cleanup, as well as their recent advances and applications in wastewater treatment. The book follows a sequential approach for the treatment of wastewater, presenting state-of-the-art techniques for the characterization and measurement of nanomaterials. Nanoparticles represent a promising new technology for wastewater remediation, not only because of their high treatment efficiency, but also for their cost effectiveness, as they have the flexibility for in situ and ex situ applications. New methods for developing nanomaterials with less environmental risk are described. Nanomaterials such as magnetic nanoparticles and graphene-based nanocomposites are discussed in detail. Also includes in-depth analyses of the ecotoxicological impacts of nanomaterials and the latest findings on the transport and fate of nanomaterials in the environment. Covers methods for the characterization of nanomaterials using advanced instrumental techniques Includes innovative methods for developing new nanomaterials while lessening their environmental risk Provides the latest methods for determining the transport and fate of nanomaterials in the environment Discusses in detail nanomaterials such as magnetic nanoparticles and graphene-based nanocomposites
Sustainable Construction Materials: Copper Slag, as part of a series of five, the book aims to promote the use of sustainable construction materials. It is different to the norm and its uniqueness lies in developing a data matrix sourced from 400 publications, contributed by 712 authors from 337 institutions in 40 countries from 1964 to 2015, on the subject of copper slag as a construction material, and systematically, analysisng, evaluating and modelling this information for use in cement, concrete, geotechnics and road pavement applications. Related environmental issues, case studies and standards are also discussed. The work establishes what is already known and can be used. It would also help to avoid repetitive research and save valuable resources, which can instead be directed towards new research to progress the use of sustainable construction materials. The book is structured in an incisive and easy to digest manner. As an excellent reference source, the book is particularly suited for researchers, academics, design engineers, specifiers, contractors, developers and certifying and regulatory authorities, seeking to promote sustainability within the construction sector. Provides an extensive source of valuable database information supported by an exhaustive and comprehensively organized list of globally published literature spanning 40-50 years, up to 2016, with over 400 references Offers an analysis, evaluation, repackaging, and modeling of existing knowledge, encouraging more responsible use of waste materials in construction Presents a wealth of knowledge for use in many sectors relating to the construction profession
This book is intended as a text for undergraduate students of Agriculture. It is useful to research scholars and other professionals in the field of agriculture development and management especially under teaching stream. Introductory Agronomy involves several basic subjects like agronomy, soil and water, farm machinery, entomology, engineering, soil science and plant breeding and genetics etc. For an integrated development and management of agriculture knowledge of all these subjects are necessary for undergraduate students. A sincere attempt is made to provide such prospective to the students. A fundamental knowledge of identification of crops, seeds, weeds, fertilizers and plant protection chemicals, water quality analysis and measurement will be needed in crop planning under different situations. Therefore, an attempt has been to present the topics relevant to the needs of the agronomy. Thus, book is therefore, designed to fulfill the need for students of agriculture and serves as reference tool for the teachers in the field of Agronomy from all points of view.
The theme of this book is the evolution, patterning and socio-cultural perceptions of status and power relations in this region since the creation of state structure during late medieval times. History and legend are recorded in this book through documents and oral narratives as well as the manner in which the past is encapsulated institutionally in society, myth and ritual.
This volume brings together analytical insights from modern social and cultural anthropology to unravel processes of globalization in the 21st century through diasporic migrations. Developments in anthropological theory and method are traced from the heritage of Enlightenment to the present times, with special reference to India. While firmly anchored in the local experience, the narrative of diasporic migrations presented in this book ranges widely to cover comparisons across the world and is informed by an interdisciplinary focus. The author deals with the issues of ethnicity, identity and modernity in a transnational and geopolitical context. The innovative and multi-dimensional thrust encompasses major themes and research methodology. The work includes important case studies and a detailed empirical exploration of the multicultural societies of Malaysia and South Africa. Authoritative and accessible, this book will be essential reading in contemporary anthropology, especially for scholars and researchers of sociology, social and cultural anthropology, diaspora and migration studies, ethnic studies and cultural studies as also international relations, foreign affairs, public policy, think-tanks and government bodies.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.