RFID security:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
2006
|
Schlagworte: | |
Beschreibung: | Includes index Print version record |
Beschreibung: | 1 online resource (xix, 242 pages) illustrations |
ISBN: | 1423771605 9781423771609 9780080489650 0080489656 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045343460 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2006 |||| o||u| ||||||eng d | ||
020 | |a 1423771605 |9 1-4237-7160-5 | ||
020 | |a 9781423771609 |9 978-1-4237-7160-9 | ||
020 | |a 9780080489650 |9 978-0-08-048965-0 | ||
020 | |a 0080489656 |9 0-08-048965-6 | ||
035 | |a (ZDB-4-ENC)ocn560082288 | ||
035 | |a (OCoLC)560082288 | ||
035 | |a (DE-599)BVBBV045343460 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 658.7/87 |2 22 | |
100 | 1 | |a Thornton, Frank |e Verfasser |4 aut | |
245 | 1 | 0 | |a RFID security |c Frank Thornton et al |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2006 | |
300 | |a 1 online resource (xix, 242 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Print version record | ||
505 | 8 | |a RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Radio |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 7 | |a Data transmission systems |2 fast | |
650 | 7 | |a Radio frequency |2 fast | |
650 | 4 | |a Data transmission systems |a Radio frequency | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a RFID |0 (DE-588)4509863-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a RFID |0 (DE-588)4509863-3 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Haines, Brad |e Sonstige |4 oth | |
700 | 1 | |a Das, Anand M. |e Sonstige |4 oth | |
700 | 1 | |a Bhargava, Hersh |e Sonstige |4 oth | |
700 | 1 | |a Campbell, Anita |e Sonstige |4 oth | |
700 | 1 | |a Kleinschmidt, John |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t RFID security |d Rockland, MA : Syngress, 2006 |z 1597490474 |z 9781597490474 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030730163 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179162273939456 |
---|---|
any_adam_object | |
author | Thornton, Frank |
author_facet | Thornton, Frank |
author_role | aut |
author_sort | Thornton, Frank |
author_variant | f t ft |
building | Verbundindex |
bvnumber | BV045343460 |
collection | ZDB-4-ENC |
contents | RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a |
ctrlnum | (ZDB-4-ENC)ocn560082288 (OCoLC)560082288 (DE-599)BVBBV045343460 |
dewey-full | 658.7/87 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.7/87 |
dewey-search | 658.7/87 |
dewey-sort | 3658.7 287 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02599nmm a2200553zc 4500</leader><controlfield tag="001">BV045343460</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423771605</subfield><subfield code="9">1-4237-7160-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423771609</subfield><subfield code="9">978-1-4237-7160-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489650</subfield><subfield code="9">978-0-08-048965-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489656</subfield><subfield code="9">0-08-048965-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocn560082288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)560082288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045343460</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.7/87</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thornton, Frank</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">RFID security</subfield><subfield code="c">Frank Thornton et al</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xix, 242 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Radio</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data transmission systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Radio frequency</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data transmission systems</subfield><subfield code="a">Radio frequency</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">RFID</subfield><subfield code="0">(DE-588)4509863-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Das, Anand M.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhargava, Hersh</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Campbell, Anita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kleinschmidt, John</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">RFID security</subfield><subfield code="d">Rockland, MA : Syngress, 2006</subfield><subfield code="z">1597490474</subfield><subfield code="z">9781597490474</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030730163</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045343460 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:29Z |
institution | BVB |
isbn | 1423771605 9781423771609 9780080489650 0080489656 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030730163 |
oclc_num | 560082288 |
open_access_boolean | |
physical | 1 online resource (xix, 242 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Thornton, Frank Verfasser aut RFID security Frank Thornton et al Rockland, MA Syngress Pub. 2006 1 online resource (xix, 242 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Print version record RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd rswk-swf RFID (DE-588)4509863-3 gnd rswk-swf RFID (DE-588)4509863-3 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Haines, Brad Sonstige oth Das, Anand M. Sonstige oth Bhargava, Hersh Sonstige oth Campbell, Anita Sonstige oth Kleinschmidt, John Sonstige oth Erscheint auch als Druck-Ausgabe RFID security Rockland, MA : Syngress, 2006 1597490474 9781597490474 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Thornton, Frank RFID security RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4509863-3 |
title | RFID security |
title_auth | RFID security |
title_exact_search | RFID security |
title_full | RFID security Frank Thornton et al |
title_fullStr | RFID security Frank Thornton et al |
title_full_unstemmed | RFID security Frank Thornton et al |
title_short | RFID security |
title_sort | rfid security |
topic | TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Data transmission systems fast Radio frequency fast Data transmission systems Radio frequency Datensicherung (DE-588)4011144-1 gnd RFID (DE-588)4509863-3 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Radio TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Data transmission systems Radio frequency Data transmission systems Radio frequency Datensicherung RFID |
work_keys_str_mv | AT thorntonfrank rfidsecurity AT hainesbrad rfidsecurity AT dasanandm rfidsecurity AT bhargavahersh rfidsecurity AT campbellanita rfidsecurity AT kleinschmidtjohn rfidsecurity |