|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910450486903321 |
|
|
Autore |
Thornton Frank |
|
|
Titolo |
RFID security [[electronic resource] /] / Frank Thornton et al |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-03565-3 |
9786611035655 |
0-08-048965-6 |
1-59749-108-X |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (266 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
BhargavaHersh |
CampbellAnita |
DasAnand M |
HainesBrad |
KleinschmidtJohn |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data transmission systems |
Radio frequency |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Part I: Overview; Chapter 1: What Is RFID?; Introduction; What This Book Is and Is Not; RFID Radio Basics; Why Use RFID?; RFID Architecture; Data Communications; Physical Form Factor (Tag Container); Summary; Links to Sites; Chapter 2: RFID Uses; Introduction; Applied Use; Standards in the Marketplace; Failures in the Marketplace; RFID for the Consumer: Case Studies; Summary; References; Part II: Attacking RFID; Chapter 3: Threat and Target Identification; Introduction; Attack Objectives; Blended Attacks; Chapter 4: RFID Attacks: Tag Encoding Attacks; Introduction |
Case Study: Johns Hopkins vs. SpeedPassThe SpeedPass; Summary; Chapter 5: RFID Attacks: Tag Application Attacks; MIM; Chip Clones-Fraud and Theft; Tracking: Passports/Clothing; Chip Cloning > Fraud; Disruption; Summary; Chapter 6: RFID Attacks: Securing Communications Using RFID Middleware; RFID Middleware Introduction; |
|
|
|
|