Emerald Group Publishing Limited
Copyright © 2004, Emerald Group Publishing Limited
This book is described by the publishers Wiley as a “Wiley Tech Brief”, and as such it just fulfills its aims.
Cyberneticians and Systemists need to know, however, that the text does not delve very deeply into any of the technology it presents. It need not, however, dwell on the detail in a technology that changes as we write this review. Both methodology and application have to change as new research is harnessed to provide new techniques and those who are dedicated to defeating new security systems become ever more successful. The various techniques employed have been discussed in the sections of this journal as they receive prominence, but Biometrics has to be a changing field. Currently, this book highlights such devices as face, fingerprint, eye or speech analysis as current “state‐of‐the art” technology, tomorrow's effective methods may be based on DNA, implanted body‐chips.
This book, however, concentrates on the “Networked World” and in consequence deals with IT security primarily. It does this by giving relevant explanations and illustrations of the current favoured technologies, describing them competently and in an undemanding manner.
The chapters that discuss standards and privacy are well presented but lack any real depth. But then it is a question for whom the book was designed for, and whether the readership is expected to have some background knowledge of IT systems and to what level. Bearing this in mind it does function as a useful brief for most IT practitioners, but not of any real use to those involved in applying biometric techniques to a variety of systems situation.