Normal view MARC view ISBD view

RFID security /

By: Thornton, Frank
Title By: Haines, Brad
Material type: BookPublisher: Rockland, MA : Syngress Media, 2006.Description: xix, 448 p. ; 25 cm.ISBN: 1597490474Subject(s): Radio frequency identification systems | Data transmission systems | Computers -- Communications -- NetworkingDDC classification: . Online resources: Location Map
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Home library Call number Status Date due Barcode Item holds
REGULAR University of Wollongong in Dubai
Main Collection
621.384 TH RF (Browse shelf) Available T0027147
Total holds: 0

Discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. This work includes coverage of topics such as: security breaches for monetary gain; how to protect the supply chain; and how to protect personal privacy.

Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management.

Powered by Koha