Livros sobre o tema "Identification and Authentication Techniques"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Identification and Authentication Techniques".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Zhang, David D. Palmprint authentication. Norwell, Mass: Kluwer Academic Publishers, 2004.
Encontre o texto completo da fonte(Firm), Knovel, ed. Modern techniques for food authentication. Amsterdam: Elsevier/Academic Press, 2008.
Encontre o texto completo da fonteW, Mak M., e Lin Shang-Hung 1968-, eds. Biometric authentication: A machine learning approach. Upper Saddle River, N.J: Prentice Hall Professional Technical Reference, 2005.
Encontre o texto completo da fonteBorivoje, Furht, e Kirovski Darko, eds. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla: Auerbach Publications, 2006.
Encontre o texto completo da fonteZviran, Moshe. A comparison of password techniques for multilevel authentication mechanisms. Monterey, Calif: Naval Postgraduate School, 1990.
Encontre o texto completo da fonte1953-, Budowle Bruce, ed. Protein staining and identification techniques. [Natick, MA]: BioTechniques Books, 1999.
Encontre o texto completo da fonteNational Computer Security Center (U.S.), ed. A Guide to understanding identification and authentication in trusted systems. [Ft. George G. Meade, MD]: National Computer Security Center, 1991.
Encontre o texto completo da fonteSchuckers, Michael E. Computational methods in biometric authentication: Statistical methods for performance evaluation. London: Springer, 2010.
Encontre o texto completo da fonteECCV 2004 International Workshop (2004 Prague, Czech Republic). Biometric authentication: ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Berlin: Springer, 2004.
Encontre o texto completo da fontePhēsatchasāt, Mahāwitthayālai Mahidon Khana, ed. A Guide to the identification and authentication of some Thai medicinal plants. Bangkok, Thailand: Faculty of Pharmacy, Mahidol University, 1986.
Encontre o texto completo da fonteAlonso-Salces, M. Rosa. Authentication of virgin olive oil using NMR and isotopic fingerprinting. Hauppauge, N.Y: Nova Science Publishers, 2011.
Encontre o texto completo da fonteXin-Qun, Zhu, ed. Moving loads: Dynamic analysis and identification techniques. London: CRC Press, 2011.
Encontre o texto completo da fonteKussmaul, Wes. The future needs you: Why and how paralegals and notaries (not technologists) will fix the Internet. 2a ed. Waltham, Mass: PKI Press, 2007.
Encontre o texto completo da fonteKussmaul, Wes. The future needs you: The notary public in the digital age. Waltham, Mass: PKI Press, 2001.
Encontre o texto completo da fonteTallitsch, Robert B. Histology: An identification manual. Philadelphia, PA: Mosby / Elsevier, 2008.
Encontre o texto completo da fonteMartin, Keith M. Entity Authentication. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198788003.003.0008.
Texto completo da fonteFeng, Guocan, Tieniu Tan, Stan Z. Li, Yunhong Wang e Jianhuang Lai. Advances in Biometric Person Authentication: 5th Chinese Conference on Biometric Recognition, SINOBIOMETRICS 2004, Guangzhou, China, December 13-14, 2004, Proceedings. Springer London, Limited, 2004.
Encontre o texto completo da fontePankanti, Sharath, Tieniu Tan, Stan Z. Li, Gérard Chollet e Zhenan Sun. Advances in Biometric Person Authentication: International Workshop on Biometric Recognition Systems, IWBRS 2005, Beijing, China, October 22 - 23, 2005, Proceedings. Springer London, Limited, 2005.
Encontre o texto completo da fonteModern Techniques for Food Authentication. Elsevier, 2018. http://dx.doi.org/10.1016/c2017-0-01345-9.
Texto completo da fonteModern Techniques for Food Authentication. Academic Press, 2018.
Encontre o texto completo da fonteSun, Da-Wen. Modern Techniques for Food Authentication. Elsevier Science & Technology Books, 2018.
Encontre o texto completo da fonteAuthTech'16: Authentication Techniques CANCELLED. Association for Computing Machinery, 2016.
Encontre o texto completo da fonteTodorov, Dobromir. Mechanics of User Identification and Authentication. Auerbach Publications, 2007. http://dx.doi.org/10.1201/9781420052206.
Texto completo da fonteMechanics of User Identification and Authentication. London: Taylor and Francis, 2007.
Encontre o texto completo da fonteLin, S. H., M. W. Mak e S. Y. Kung. Biometric Authentication: A Machine Learning Approach. Pearson Education, Limited, 2004.
Encontre o texto completo da fonteAnalysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.
Encontre o texto completo da fonteAnalysis of Food Spices: Identification and Authentication. CRC Press LLC, 2023.
Encontre o texto completo da fonteAnalysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.
Encontre o texto completo da fonteAnalysis of Food Spices: Identification and Authentication. Taylor & Francis Group, 2023.
Encontre o texto completo da fonteSiddiqi, K. S., e Leo M. L. Nollet, eds. Fingerprinting Techniques in Food Authentication and Traceability. CRC Press, 2018. http://dx.doi.org/10.1201/b21931.
Texto completo da fonteFurht, Borko, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Editado por Borko Furht e Darko Kirovski. Auerbach Publications, 2006. http://dx.doi.org/10.1201/9781420013450.
Texto completo da fonteFurht, Borko, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Encontre o texto completo da fonteNollet, Leo M. L., e K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteNollet, Leo M. L., e K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteFurht, Borko, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Encontre o texto completo da fonteNollet, Leo M. L., e K. S. Siddiqi. Fingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteFurht, Borivoje, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Taylor & Francis Group, 2010.
Encontre o texto completo da fonteFurht, Borko, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Encontre o texto completo da fonteFurht, Borko, e Darko Kirovski. Multimedia Encryption and Authentication Techniques and Applications. Auerbach Publishers, Incorporated, 2006.
Encontre o texto completo da fonteFingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteFingerprinting Techniques in Food Authentication and Traceability. Taylor & Francis Group, 2018.
Encontre o texto completo da fonteCichna-Markl, Margit, e Isabel Mafra, eds. Techniques for Food Authentication: Trends and Emerging Approaches. MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-7655-8.
Texto completo da fonteAnderson, James, e Rayford Vaughn. Guide to Understanding Identification and Authentication in Trusted Systems. Diane Pub Co, 1991.
Encontre o texto completo da fonteServices, BPI Information. Guide to Understanding Identification and Authentication in Trusted Systems. Bpi Information Services, 1991.
Encontre o texto completo da fonteSong, Ong Thian, Tee Connie e Mohd Shohel Sayeed. Security and Authentication: Perspectives, Management and Challenges. Nova Science Publishers, Incorporated, 2018.
Encontre o texto completo da fonteNanda, Vikas, Jalal Uddin e Gulzar Ahmad Nayik. Advanced Techniques of Honey Analysis: Characterization, Authentication, and Adulteration. Elsevier Science & Technology Books, 2024.
Encontre o texto completo da fonteAdvanced Techniques of Honey Analysis: Characterization, Authentication, and Adulteration. Elsevier Science & Technology, 2024.
Encontre o texto completo da fonteGonzález-Domínguez, Raúl, ed. Food Authentication: Techniques, Trends and Emerging Approaches (Second Issue). MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-8921-3.
Texto completo da fonteCozzolino, Daniel, ed. Advances of Spectrometric Techniques in Food Analysis and Authentication. MDPI, 2023. http://dx.doi.org/10.3390/books978-3-0365-6669-6.
Texto completo da fonteGupta, Phalguni, Dakshina Ranjan Kisku e Jamuna Kanta Sing. Advances in Biometrics for Secure Human Authentication and Recognition. Taylor & Francis Group, 2013.
Encontre o texto completo da fonte