< Back
Page 5 of 5
This chapter is from the book
Conclusion
This book was written to provide a guide and roadmap for the successful deployment of biometrics for network security. The book is broken down into sections to keep the related information contained, and to allow the different groups of people reading this book to get the most out of it.
< Back
Page 5 of 5