RFID security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
c2006
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Includes bibliographical references and index RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a Chapter 1: What is RFID? -- Chapter 2: RFID Use Cases -- Chapter 3: RFID Processes -- Chapter 4: Threat Modeling for RFID Systems -- Chapter 5: Target Identification -- Chapter 6: RFID Processes -- Chapter 7: Tag Encoding Attacks -- Chapter 8: Tag Application Attacks -- Chapter 9: Attacking the Air Interface -- Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory -- Chapter 12: The Four Disciplines -- Chapter 13: Vulnerability Management -- Chapter 14: Identity Management in RFID -- Chapter 15: Trust Management -- Chapter 16: Threat Management |
Beschreibung: | 1 Online-Ressource (xix, 242 p.) |
ISBN: | 1423771605 9781423771609 9780080489650 0080489656 9781597490474 1597490474 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042957098 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151029s2006 |||| o||u| ||||||eng d | ||
020 | |a 1423771605 |c electronic bk. |9 1-4237-7160-5 | ||
020 | |a 9781423771609 |c electronic bk. |9 978-1-4237-7160-9 | ||
020 | |a 9780080489650 |c electronic bk. |9 978-0-08-048965-0 | ||
020 | |a 0080489656 |c electronic bk. |9 0-08-048965-6 | ||
020 | |a 9781597490474 |9 978-1-59749-047-4 | ||
020 | |a 0080489656 |9 0-08-048965-6 | ||
020 | |a 1597490474 |9 1-59749-047-4 | ||
035 | |a (OCoLC)560082288 | ||
035 | |a (DE-599)BVBBV042957098 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.7/87 |2 22 | |
100 | 1 | |a Thornton, Frank |e Verfasser |4 aut | |
245 | 1 | 0 | |a RFID security |c Frank Thornton et al |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c c2006 | |
300 | |a 1 Online-Ressource (xix, 242 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
500 | |a RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a | ||
500 | |a Chapter 1: What is RFID? -- Chapter 2: RFID Use Cases -- Chapter 3: RFID Processes -- Chapter 4: Threat Modeling for RFID Systems -- Chapter 5: Target Identification -- Chapter 6: RFID Processes -- Chapter 7: Tag Encoding Attacks -- Chapter 8: Tag Application Attacks -- Chapter 9: Attacking the Air Interface -- Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory -- Chapter 12: The Four Disciplines -- Chapter 13: Vulnerability Management -- Chapter 14: Identity Management in RFID -- Chapter 15: Trust Management -- Chapter 16: Threat Management | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Radio |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 7 | |a Radio frequency identification systems / Security measures |2 local | |
650 | 7 | |a Inventory control / Automation / Security measures |2 local | |
650 | 7 | |a Computer security |2 local | |
650 | 7 | |a Data transmission systems |2 fast | |
650 | 7 | |a Radio frequency |2 fast | |
650 | 4 | |a Data transmission systems | |
650 | 4 | |a Radio frequency | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Haines, Brad |e Sonstige |4 oth | |
700 | 1 | |a Das, Anand M. |e Sonstige |4 oth | |
700 | 1 | |a Bhargava, Hersh |e Sonstige |4 oth | |
700 | 1 | |a Campbell, Anita |e Sonstige |4 oth | |
700 | 1 | |a Kleinschmidt, John |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=157307 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBU | ||
940 | 1 | |q FLA_PDA_EBU | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028383015 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804175275256184832 |
---|---|
any_adam_object | |
author | Thornton, Frank |
author_facet | Thornton, Frank |
author_role | aut |
author_sort | Thornton, Frank |
author_variant | f t ft |
building | Verbundindex |
bvnumber | BV042957098 |
collection | ZDB-4-EBU |
ctrlnum | (OCoLC)560082288 (DE-599)BVBBV042957098 |
dewey-full | 658.7/87 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.7/87 |
dewey-search | 658.7/87 |
dewey-sort | 3658.7 287 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03608nmm a2200649zc 4500</leader><controlfield tag="001">BV042957098</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151029s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423771605</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-7160-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423771609</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-7160-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489650</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-048965-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489656</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-048965-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490474</subfield><subfield code="9">978-1-59749-047-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489656</subfield><subfield code="9">0-08-048965-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490474</subfield><subfield code="9">1-59749-047-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560082288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042957098</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.7/87</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thornton, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">RFID security</subfield><subfield code="c">Frank Thornton et al</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xix, 242 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Chapter 1: What is RFID? -- Chapter 2: RFID Use Cases -- Chapter 3: RFID Processes -- Chapter 4: Threat Modeling for RFID Systems -- Chapter 5: Target Identification -- Chapter 6: RFID Processes -- Chapter 7: Tag Encoding Attacks -- Chapter 8: Tag Application Attacks -- Chapter 9: Attacking the Air Interface -- Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory -- Chapter 12: The Four Disciplines -- Chapter 13: Vulnerability Management -- Chapter 14: Identity Management in RFID -- Chapter 15: Trust Management -- Chapter 16: Threat Management</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Radio</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radio frequency identification systems / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Inventory control / Automation / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data transmission systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radio frequency</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radio frequency</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Anand M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhargava, Hersh</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Campbell, Anita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleinschmidt, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=157307</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_EBU</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028383015</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV042957098 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:13:42Z |
institution | BVB |
isbn | 1423771605 9781423771609 9780080489650 0080489656 9781597490474 1597490474 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028383015 |
oclc_num | 560082288 |
open_access_boolean | |
physical | 1 Online-Ressource (xix, 242 p.) |
psigel | ZDB-4-EBU FLA_PDA_EBU |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Thornton, Frank Verfasser aut RFID security Frank Thornton et al Rockland, MA Syngress Pub. c2006 1 Online-Ressource (xix, 242 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a Chapter 1: What is RFID? -- Chapter 2: RFID Use Cases -- Chapter 3: RFID Processes -- Chapter 4: Threat Modeling for RFID Systems -- Chapter 5: Target Identification -- Chapter 6: RFID Processes -- Chapter 7: Tag Encoding Attacks -- Chapter 8: Tag Application Attacks -- Chapter 9: Attacking the Air Interface -- Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory -- Chapter 12: The Four Disciplines -- Chapter 13: Vulnerability Management -- Chapter 14: Identity Management in RFID -- Chapter 15: Trust Management -- Chapter 16: Threat Management TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf RFID (DE-588)4509863-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Haines, Brad Sonstige oth Das, Anand M. Sonstige oth Bhargava, Hersh Sonstige oth Campbell, Anita Sonstige oth Kleinschmidt, John Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=157307 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Thornton, Frank RFID security TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4509863-3 |
title | RFID security |
title_auth | RFID security |
title_exact_search | RFID security |
title_full | RFID security Frank Thornton et al |
title_fullStr | RFID security Frank Thornton et al |
title_full_unstemmed | RFID security Frank Thornton et al |
title_short | RFID security |
title_sort | rfid security |
topic | TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Radio frequency identification systems / Security measures local Inventory control / Automation / Security measures local Computer security local Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Radio TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Radio frequency identification systems / Security measures Inventory control / Automation / Security measures Computer security Data transmission systems Radio frequency Datensicherung RFID |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=157307 |
work_keys_str_mv | AT thorntonfrank rfidsecurity AT hainesbrad rfidsecurity AT dasanandm rfidsecurity AT bhargavahersh rfidsecurity AT campbellanita rfidsecurity AT kleinschmidtjohn rfidsecurity |