買這商品的人也買了...
-
$780$624 -
$680$537 -
$1,100$1,078 -
$1,264Advanced Programming in the UNIX Environment, 2/e (Hardcover)
-
$550$468 -
$780$616 -
$680$666 -
$550$435 -
$650$553 -
$520$199 -
$720$569 -
$490$417 -
$600$480 -
$740$585 -
$980$774 -
$1,180$1,003 -
$480$408 -
$480$408 -
$580$493 -
$590$466 -
$360$306 -
$650$514 -
$980$774 -
$680$537 -
$550$468
相關主題
商品描述
Description
This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, the extent of their success, the various barriers that may be brought against their actions, and the effectiveness of those barriers. The new field of lightweight cryptography is described in the context of using RFID systems in the fight against counterfeit products, its cost effectiveness is examined and feasible approaches to its deployment are described. Research problems and likely avenues for solutions are also presented to guide a global effort in anti-counterfeiting.