000 | 01473cam a2200217u 4500 | ||
---|---|---|---|
999 |
_c11132 _d11132 |
||
001 | 28922 | ||
020 | _a1597490474 | ||
082 | _a. | ||
100 | 1 |
_aThornton, Frank. _957012 |
|
245 | 1 | 0 |
_aRFID security / _cFrank Thornton, Brad Haines...[et.al.]. |
260 |
_aRockland, MA : _bSyngress Media, _c2006. |
||
300 |
_axix, 448 p. ; _c25 cm. |
||
500 | _aDiscusses the motives for someone wanting to hack an RFID system and shows how to protect systems. This work includes coverage of topics such as: security breaches for monetary gain; how to protect the supply chain; and how to protect personal privacy. | ||
505 | 0 | _aChapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management. | |
650 | 1 | 4 |
_aRadio frequency identification systems. _9221 |
650 | 1 | 4 |
_aData transmission systems. _93263 |
650 | 4 |
_aComputers _xCommunications _xNetworking. _960553 |
|
700 | 1 | 0 |
_aHaines, Brad. _938654 |
856 |
_uhttps://uowd.box.com/s/oqycxyaz9goe94zm7ikvzhmisofqoa9b _zLocation Map |
||
942 |
_cREGULAR _2ddc |