Home | Syllabus | Title Page | Introduction | How Biometrics is used | How Computers Read Biometrics | Issues of Biometrics | Conclusion | Bibliography |
Department of Homeland Security. (2007). Privacy Implementation Technology Guide. Retrieved October 3, 2009, from http://www.biometrics.gov/docs/privacy_guide_ptig.pdf.
Li Y. & Xu X. (2009). Revolutionary Information System Application in Biometrics. International Conference on Networking and Digital Society, 1. 1-4. Retrieved October 2, 2009, from IEEE Xplore Digital Library. IEEE/IET Electronic Library.
National Science and Technology Council. (2006). Biometrics History. Retrieved October 3, 2009, from http://www.biometrics.gov/Documents/BioHistory.pdf.
Steinberg G. (2008). Introduction to Computer Information Systems (2nd ed.). (pp. 443) Dubuque, Iowa: Kendall/Hunt Publishing Company.
Whitman M. & Mattord H. (2005). Principles of Information Security (2nd ed.). (pp. 332- 336).Boston: Thomson Course Technology.
Woodward J. (2007). Biometrics: Privacy’s Foe or Privacy’s Friend. Proceedings of the IEEE, 85(9). 1-13. Retrieved October 2, 2009, from IEEE Xplore Digital Library. IEEE/IET Electronic Library.
A girl on a computer clip art on a syllabus.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 10/28/2009).
A fingerprint clip art on a current.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 11/07/2009).
An eye within a monitor clip art on a conclusion.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 11/07/2009).