Home > Articles > Security > Network Security

  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Conclusion

This book was written to provide a guide and roadmap for the successful deployment of biometrics for network security. The book is broken down into sections to keep the related information contained, and to allow the different groups of people reading this book to get the most out of it.

  • + Share This
  • 🔖 Save To Your Account