RFID Handbook: Applications, Technology, Security, and Privacy
✍ Scribed by Syed A. Ahson
- Publisher
- CRC Press
- Year
- 2008
- Tongue
- English
- Leaves
- 714
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the world’s largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it poses.
The RFID Handbook provides an overview of RFID technology, its associated security and privacy risks, and recommended practices that will enable organizations to realize productivity improvements while also protecting sensitive information and the privacy of individuals.
✦ Subjects
Информатика и вычислительная техника;Информационная безопасность;Инженерно-техническая защита информации;
📜 SIMILAR VOLUMES
<P><BLOCKQUOTE>“RFID is the first important technology of the twenty-first century. That’s an awesome responsibility. How can we know when and how RFID is being used? How can we make sure it is not misused? How can we exercise choice over how it affects us personally? How do we ensure it is safe? Th
Brings together contributions from stakeholder community - from RFID suppliers to privacy advocates and beyond. This book also looks beyond RFID, reviewing the privacy implications of Wi-Fi, Bluetooth, smart cards, biometrics, new cell-phone networks, and the ever-evolving Internet.
In the beginning of 2003, I found a short article about the privacy implications of RFID technology in a newspaper. It raised my interest, and after reading some early research papers on the topic, I thought: “There must exist better solutions. ” I c- cerned myself with the topic in my spare time. A
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte
Slamming the door on security threats just got easier for IT professionals. This total resource on security design and operations puts today's most powerful tools and techniques at their command, providing the latest hands-on expertise on everything from access control to privacy enhancement. Writte