000 01473cam a2200217u 4500
999 _c11132
_d11132
001 28922
020 _a1597490474
082 _a.
100 1 _aThornton, Frank.
_957012
245 1 0 _aRFID security /
_cFrank Thornton, Brad Haines...[et.al.].
260 _aRockland, MA :
_bSyngress Media,
_c2006.
300 _axix, 448 p. ;
_c25 cm.
500 _aDiscusses the motives for someone wanting to hack an RFID system and shows how to protect systems. This work includes coverage of topics such as: security breaches for monetary gain; how to protect the supply chain; and how to protect personal privacy.
505 0 _aChapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management.
650 1 4 _aRadio frequency identification systems.
_9221
650 1 4 _aData transmission systems.
_93263
650 4 _aComputers
_xCommunications
_xNetworking.
_960553
700 1 0 _aHaines, Brad.
_938654
856 _uhttps://uowd.box.com/s/oqycxyaz9goe94zm7ikvzhmisofqoa9b
_zLocation Map
942 _cREGULAR
_2ddc