RFID Security

Author:   Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA) ,  Chris Lanthem (Security/Network Engineer for NSight Technologies, USA) ,  Frank Thornton
Publisher:   Syngress Media,U.S.
ISBN:  

9781597490474


Pages:   448
Publication Date:   25 May 2006
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $137.15 Quantity:  
Add to Cart

Share |

RFID Security


Add your own review!

Overview

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a hacker to lower the pricing on any product products). How to protect the supply chain (malicous/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products). How to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits). The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, colour, date of purchase, etc. .

Full Product Details

Author:   Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA) ,  Chris Lanthem (Security/Network Engineer for NSight Technologies, USA) ,  Frank Thornton
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 15.20cm , Height: 1.40cm , Length: 22.90cm
Weight:   0.410kg
ISBN:  

9781597490474


ISBN 10:   1597490474
Pages:   448
Publication Date:   25 May 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   No Longer Our Product
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Reviews

Author Information

"Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard ""ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."""

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List