Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
RFID Security
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

RFID Security

RFID Security

Protect the Supply Chain

Frank Thornton, Brad Haines, Anand M. Das - Collection 4 Free Booklets Your Solutions Membership

448 pages, parution le 05/11/2005

Résumé

Protect the Supply Chain

RFID Security reveals the motives of RFID hackers and then explains how to protect systems. Coverage includes how to prevent attackers from exploiting security breaches for monetary gain (hacking a store's RFID system would allow a hacker to lower the pricing on any product); how to protect the supply chain (malicious/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products); and how to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).

  • Understand RFID Standards
    Learn the various country, application, and vendor frequencies and classes of tags.
  • Manipulate Tag Data
    See how someone looking to steal multiple items could change the data on the tags attached to those items.
  • Implement Security Measures
    Understand the types of RFID attacks to see how someone might try to steal a single object or even try to prevent sales at a single store or chain of stores.
  • Review Tag Encoding and Tag Application Attacks
    Review man-in-the-middle attacks, as well as chip clones, tracking, and disruption attacks to RFID systems.
  • Prevent Unauthorized Access
    Ensure secure communications by deploying RFID middleware.
  • Prevent Backend Communication Attacks
    Prevent man-in-the-middle and TCP replay attacks on the backend.
  • Assess the Risk and Vulnerability of Implementing RFID
    Learn the questions to ask to determine the risks to your company.

Sommaire

  • What is RFID?
  • RFID uses
  • Threat and target identification
  • RFID attacks : tag encoding attacks
  • RFID attacks : tag application attacks
  • RFID attacks : securing communications using RFID middleware
  • RFID security : attacking the backend
  • Management of RFID security
  • Case study : using commerce events AdaptLink to secure the DOD supply network - leveraging the DOD RFID mandate
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Syngress
Auteur(s) Frank Thornton, Brad Haines, Anand M. Das
Collection 4 Free Booklets Your Solutions Membership
Parution 05/11/2005
Nb. de pages 448
Format 18 x 23
Couverture Broché
Poids 410g
Intérieur Noir et Blanc
EAN13 9781597490474
ISBN13 978-1-59749-047-4

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription