Home Syllabus Title Page Introduction How Biometrics is used How Computers Read Biometrics Issues of Biometrics Conclusion Bibliography

Bibliography


References

Department of Homeland Security. (2007). Privacy Implementation Technology Guide. Retrieved October 3, 2009, from http://www.biometrics.gov/docs/privacy_guide_ptig.pdf.

Li Y. & Xu X. (2009). Revolutionary Information System Application in Biometrics. International Conference on Networking and Digital Society, 1. 1-4. Retrieved October 2, 2009, from IEEE Xplore Digital Library. IEEE/IET Electronic Library.

National Science and Technology Council. (2006). Biometrics History. Retrieved October 3, 2009, from http://www.biometrics.gov/Documents/BioHistory.pdf.

Steinberg G. (2008). Introduction to Computer Information Systems (2nd ed.). (pp. 443) Dubuque, Iowa: Kendall/Hunt Publishing Company.

Whitman M. & Mattord H. (2005). Principles of Information Security (2nd ed.). (pp. 332- 336).Boston: Thomson Course Technology.

Woodward J. (2007). Biometrics: Privacy’s Foe or Privacy’s Friend. Proceedings of the IEEE, 85(9). 1-13. Retrieved October 2, 2009, from IEEE Xplore Digital Library. IEEE/IET Electronic Library.

Graphics

A girl on a computer clip art on a syllabus.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 10/28/2009).

A fingerprint clip art on a current.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 11/07/2009).

An eye within a monitor clip art on a conclusion.html page is obtained from Microsoft Office 2007 clip art collection (retreived on 11/07/2009).

Valid XHTML 1.0 Transitional