RFID security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
c2006
|
Schlagworte: | |
Online-Zugang: | FAW01 Volltext |
Beschreibung: | Includes index Includes bibliographical references and index RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a |
Beschreibung: | 1 Online-Ressource (xix, 242 p.) |
ISBN: | 0080489656 1423771605 1597490474 9780080489650 9781423771609 9781597490474 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042307759 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2006 |||| o||u| ||||||eng d | ||
020 | |a 0080489656 |9 0-08-048965-6 | ||
020 | |a 0080489656 |c electronic bk. |9 0-08-048965-6 | ||
020 | |a 1423771605 |c electronic bk. |9 1-4237-7160-5 | ||
020 | |a 1597490474 |9 1-59749-047-4 | ||
020 | |a 9780080489650 |c electronic bk. |9 978-0-08-048965-0 | ||
020 | |a 9781423771609 |c electronic bk. |9 978-1-4237-7160-9 | ||
020 | |a 9781597490474 |9 978-1-59749-047-4 | ||
035 | |a (OCoLC)560082288 | ||
035 | |a (DE-599)BVBBV042307759 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 658.7/87 |2 22 | |
100 | 1 | |a Thornton, Frank |e Verfasser |4 aut | |
245 | 1 | 0 | |a RFID security |c Frank Thornton et al |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c c2006 | |
300 | |a 1 Online-Ressource (xix, 242 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
500 | |a RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Radio |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 7 | |a Radio frequency identification systems / Security measures |2 local | |
650 | 7 | |a Inventory control / Automation / Security measures |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Data transmission systems |2 fast | |
650 | 7 | |a Radio frequency |2 fast | |
650 | 4 | |a Data transmission systems | |
650 | 4 | |a Radio frequency | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Haines, Brad |e Sonstige |4 oth | |
700 | 1 | |a Das, Anand M. |e Sonstige |4 oth | |
700 | 1 | |a Bhargava, Hersh |e Sonstige |4 oth | |
700 | 1 | |a Campbell, Anita |e Sonstige |4 oth | |
700 | 1 | |a Kleinschmidt, John |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597490474 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD | ||
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027744751 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597490474 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152893435019264 |
---|---|
any_adam_object | |
author | Thornton, Frank |
author_facet | Thornton, Frank |
author_role | aut |
author_sort | Thornton, Frank |
author_variant | f t ft |
building | Verbundindex |
bvnumber | BV042307759 |
collection | ZDB-33-ESD |
ctrlnum | (OCoLC)560082288 (DE-599)BVBBV042307759 |
dewey-full | 658.7/87 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.7/87 |
dewey-search | 658.7/87 |
dewey-sort | 3658.7 287 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03120nmm a2200661zc 4500</leader><controlfield tag="001">BV042307759</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489656</subfield><subfield code="9">0-08-048965-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489656</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048965-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423771605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-7160-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490474</subfield><subfield code="9">1-59749-047-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489650</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048965-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423771609</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-7160-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490474</subfield><subfield code="9">978-1-59749-047-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560082288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042307759</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.7/87</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thornton, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">RFID security</subfield><subfield code="c">Frank Thornton et al</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 242 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Radio</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radio frequency identification systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Inventory control / Automation / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data transmission systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radio frequency</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radio frequency</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Anand M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhargava, Hersh</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Campbell, Anita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleinschmidt, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597490474</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027744751</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597490474</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042307759 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:57Z |
institution | BVB |
isbn | 0080489656 1423771605 1597490474 9780080489650 9781423771609 9781597490474 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027744751 |
oclc_num | 560082288 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xix, 242 p.) |
psigel | ZDB-33-ESD FLA_PDA_ESD ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Thornton, Frank Verfasser aut RFID security Frank Thornton et al Rockland, MA Syngress Pub. c2006 1 Online-Ressource (xix, 242 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf RFID (DE-588)4509863-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Haines, Brad Sonstige oth Das, Anand M. Sonstige oth Bhargava, Hersh Sonstige oth Campbell, Anita Sonstige oth Kleinschmidt, John Sonstige oth http://www.sciencedirect.com/science/book/9781597490474 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Thornton, Frank RFID security TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4509863-3 |
title | RFID security |
title_auth | RFID security |
title_exact_search | RFID security |
title_full | RFID security Frank Thornton et al |
title_fullStr | RFID security Frank Thornton et al |
title_full_unstemmed | RFID security Frank Thornton et al |
title_short | RFID security |
title_sort | rfid security |
topic | TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Radio TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Radio frequency identification systems / Security measures Inventory control / Automation / Security measures Computer security Data transmission systems Radio frequency Datensicherung RFID |
url | http://www.sciencedirect.com/science/book/9781597490474 |
work_keys_str_mv | AT thorntonfrank rfidsecurity AT hainesbrad rfidsecurity AT dasanandm rfidsecurity AT bhargavahersh rfidsecurity AT campbellanita rfidsecurity AT kleinschmidtjohn rfidsecurity |