Cargando…

How to cheat at deploying and securing RFID /

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to bee...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Sanghera, Paul (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, Mass. : Syngress Pub., �2007.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn298780446
003 OCoLC
005 20231117015108.0
006 m o d
007 cr zn|||||||||
008 081125s2007 maua o 001 0 eng d
010 |z  2008270957 
040 |a CtWfDGI  |b eng  |e pn  |c COCUF  |d N$T  |d YDXCP  |d UBF  |d IDEBK  |d OCLCQ  |d UMI  |d CEF  |d E7B  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d VLB  |d OCLCQ  |d OCLCF  |d OPELS  |d OCLCQ  |d COO  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d D6H  |d VTS  |d AU@  |d S9I  |d JBG  |d STF  |d WYU  |d UAB  |d LEAUB  |d M8D  |d VT2  |d OCLCO  |d OCLCQ  |d INARC 
015 |a GBA773287  |2 bnb 
016 7 |a 013888999  |2 Uk 
019 |a 191054476  |a 228148153  |a 319430615  |a 433032756  |a 647688888  |a 1044271451  |a 1056340073  |a 1058080689  |a 1060876530  |a 1103279127  |a 1129359712  |a 1152982228  |a 1192342658  |a 1240513084  |a 1319329926 
020 |a 9780080556895  |q (electronic bk.) 
020 |a 0080556892  |q (electronic bk.) 
020 |z 9781597492300 
020 |z 1597492302  |q (pbk.) 
035 |a (OCoLC)298780446  |z (OCoLC)191054476  |z (OCoLC)228148153  |z (OCoLC)319430615  |z (OCoLC)433032756  |z (OCoLC)647688888  |z (OCoLC)1044271451  |z (OCoLC)1056340073  |z (OCoLC)1058080689  |z (OCoLC)1060876530  |z (OCoLC)1103279127  |z (OCoLC)1129359712  |z (OCoLC)1152982228  |z (OCoLC)1192342658  |z (OCoLC)1240513084  |z (OCoLC)1319329926 
050 4 |a TK6553  |b .H67 2007eb 
072 7 |a TEC  |x 018000  |2 bisacsh 
072 7 |a TEC  |x 009060  |2 bisacsh 
072 7 |a BUS  |x 087000  |2 bisacsh 
082 0 4 |a 658.54  |2 22 
245 0 0 |a How to cheat at deploying and securing RFID /  |c Paul Sanghera [and others]. 
260 |a Burlington, Mass. :  |b Syngress Pub.,  |c �2007. 
300 |a 1 online resource (343 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
505 0 |a Contents -- Chapter 1: Physics, Math, and RFID: Mind the Gap -- Introduction -- Some Bare-Bones Physics Concepts -- Understanding Electricity -- Understanding Magnetism -- Understanding Electromagnetism -- Electromagnetic Waves -- Types of Electromagnetic Waves -- The Electromagnetic Spectrum -- The Mathematics of RFID -- Scientific Notation -- Logarithms -- Decibel -- Units -- An Overview of RFID: How It Works -- Summary -- Chapter 2: The Physics of RFID -- Introduction -- Understanding Radio Frequency Communication -- Elements of Radio Frequency Communication -- Modulation: Don't Leave Antenna Without It -- Frequency Bands in Modulation -- Understanding Modulation Types -- Amplitude Modulation and Amplitude Shift Keying -- Frequency Modulation and Frequency Shift Keying -- Phase Modulation and Phase Shift Keying -- On-Off Keying (OOK) -- RFID Communication Techniques -- Communication Through Coupling -- Communication Through Backscattering -- Understanding Performance Characteristics of an RFID System -- Cable Loss -- Impedance -- The Voltage Standing Wave Ratio -- Noise -- Beamwidth -- Directivity -- Antenna Gain -- Polarization -- Resonance Frequency -- Performing Antenna Power Calculations -- Effective Radiated Power -- The Travel Adventures of RF Waves -- Absorption -- Attenuation -- Dielectric Effects -- Diffraction -- Free Space Loss -- Interference -- Reflection -- Refraction -- Scattering -- Summary -- Key Terms -- Chapter 3: Working with RFID Tags -- Introduction -- Understanding Tags -- Components of a Tag -- Tag Size -- Operating Tag Frequencies -- Understanding Tag Types -- Passive Tags -- Semipassive Tags -- Active Tags -- Tag Classification -- Class 0 Tags -- Class 1 Tags -- Class 2 Tags -- Class 3 Tags -- Class 4 Tags -- Class 5 Tags -- Read Ranges of Tags -- Labeling and Placing a Tag -- Labeling a Tag -- Selecting Adhesive Types for Tags -- Placing a Tag -- Summary -- Key Terms -- Chapter 4: Working with Interrogation Zones -- Introduction -- Understanding an Interrogator -- What an Interrogator Is Made Of -- Interrogator Types -- What an Interrogator Is Good For -- Communicating With the Host -- Dealing With Dense Environments -- Understanding Collisions -- Anticollision Protocols -- Configuring Interrogation Zones -- Configuring Interrogator Commands -- Configuring Interrogator Settings -- Optimizing Interrogation Zones -- The Network Factor -- Summary -- Key Terms -- Chapter 5: Working with Regulations and Standards -- Introduction -- Understanding Regulations and Standards -- Regulations -- Standards -- Regulating Frequency Usage -- The Regulatory Regions -- Safety Regulations -- RFID Standards -- ISO Standards -- EPCglobal Standards -- Air Interface and Tag Data Standards -- Impact of Regulations and Standards -- Advantages of Regulations -- Advantages of Standards -- Disadvantages of Regulation. 
588 0 |a Print version record. 
520 |a RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book! * For most business organizations, adopting RFID is a matter of when * The RFID services market is expected to reach $4 billion by 2008. 
650 0 |a Radio frequency identification systems. 
650 0 |a Business logistics. 
650 6 |a Syst�emes d'identification par radiofr�equence.  |0 (CaQQLa)201-0356244 
650 6 |a Logistique (Organisation)  |0 (CaQQLa)201-0024063 
650 7 |a TECHNOLOGY & ENGINEERING  |x Industrial Technology.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Industrial Engineering.  |2 bisacsh 
650 7 |a BUSINESS & ECONOMICS  |x Production & Operations Management.  |2 bisacsh 
650 7 |a Business logistics.  |2 fast  |0 (OCoLC)fst00842759 
650 7 |a Radio frequency identification systems.  |2 fast  |0 (OCoLC)fst01087324 
650 1 7 |a Radiografische identificatie.  |2 gtt 
650 1 7 |a Techniek.  |2 gtt 
650 1 7 |a Databescherming.  |2 gtt 
700 1 |a Sanghera, Paul.  |4 aut 
776 0 8 |i Print version:  |a Thornton, Frank (Thorn).  |t How to cheat at deploying and securing RFID.  |d Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], �2007  |z 9781597492300  |z 1597492302  |w (OCoLC)166379657 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597492300  |z Texto completo