RFID Security

Author:   Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA) ,  Chris Lanthem (Security/Network Engineer for NSight Technologies, USA) ,  Frank Thornton
Publisher:   Syngress Media,U.S.
ISBN:  

9781597490474


Pages:   448
Publication Date:   25 May 2006
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $137.15 Quantity:  
Add to Cart

Share |

RFID Security


Add your own review!

Overview

Full Product Details

Author:   Frank Thornton (Owner, Blackthorn Systems, New Hampshire, USA) ,  Chris Lanthem (Security/Network Engineer for NSight Technologies, USA) ,  Frank Thornton
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 15.20cm , Height: 1.40cm , Length: 22.90cm
Weight:   0.410kg
ISBN:  

9781597490474


ISBN 10:   1597490474
Pages:   448
Publication Date:   25 May 2006
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   No Longer Our Product
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management

Reviews

Author Information

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard ""ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information.""

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List