RFID Security
Frank Thornton, Chris Lanthem
- 出版商: Syngress Media
- 出版日期: 2006-04-01
- 定價: $1,700
- 售價: 6.0 折 $1,020
- 語言: 英文
- 頁數: 448
- 裝訂: Paperback
- ISBN: 1597490474
- ISBN-13: 9781597490474
-
相關分類:
RFID、資訊安全
立即出貨(限量) (庫存=1)
買這商品的人也買了...
-
$1,580$1,501 -
$1,200$1,176 -
$680$578 -
$1,730$1,644 -
$880$695 -
$650$553 -
$780$741 -
$780$663 -
$613Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0
-
$1,068An Introduction to Formal Languages and Automata, 4/e
-
$650$507 -
$550$468 -
$980$774 -
$520$442 -
$750$638 -
$1,121Pattern Recognition, 3/e(IE)
-
$1,068Cryptography and Network Security, 4/e (IE) (美國版ISBN:0131873164) (平裝)
-
$720$612 -
$1,920$1,824 -
$880$695 -
$2,920$2,774 -
$580$452 -
$600$480 -
$720$612 -
$490$417
商品描述
Description
Protect the Supply Chain
RFID Security reveals the motives of RFID hackers and then explains how to protect systems. Coverage includes how to prevent attackers from exploiting security breaches for monetary gain (hacking a store’s RFID system would allow a hacker to lower the pricing on any product); how to protect the supply chain (malicious/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products); and how to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
Understand RFID Standards
Learn the various country, application, and vendor frequencies and classes of tags. Manipulate Tag Data
See how someone looking to steal multiple items could change the data on the tags attached to those items. Implement Security Measures
Understand the types of RFID attacks to see how someone might try to steal a single object or even try to prevent sales at a single store or chain of stores. Review Tag Encoding and Tag Application Attacks
Review man-in-the-middle attacks, as well as chip clones, tracking, and disruption attacks to RFID systems. Prevent Unauthorized Access
Ensure secure communications by deploying RFID middleware. Prevent Backend Communication Attacks
Prevent man-in-the-middle and TCP replay attacks on the backend. Assess the Risk and Vulnerability of Implementing RFID
Learn the questions to ask to determine the risks to your company.