Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc

Title How to cheat at deploying and securing RFID / Paul Sanghera [and others].

Imprint Burlington, Mass. : Syngress Pub., ©2007.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (343 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
data file
Contents Contents -- Chapter 1: Physics, Math, and RFID: Mind the Gap -- Introduction -- Some Bare-Bones Physics Concepts -- Understanding Electricity -- Understanding Magnetism -- Understanding Electromagnetism -- Electromagnetic Waves -- Types of Electromagnetic Waves -- The Electromagnetic Spectrum -- The Mathematics of RFID -- Scientific Notation -- Logarithms -- Decibel -- Units -- An Overview of RFID: How It Works -- Summary -- Chapter 2: The Physics of RFID -- Introduction -- Understanding Radio Frequency Communication -- Elements of Radio Frequency Communication -- Modulation: Don't Leave Antenna Without It -- Frequency Bands in Modulation -- Understanding Modulation Types -- Amplitude Modulation and Amplitude Shift Keying -- Frequency Modulation and Frequency Shift Keying -- Phase Modulation and Phase Shift Keying -- On-Off Keying (OOK) -- RFID Communication Techniques -- Communication Through Coupling -- Communication Through Backscattering -- Understanding Performance Characteristics of an RFID System -- Cable Loss -- Impedance -- The Voltage Standing Wave Ratio -- Noise -- Beamwidth -- Directivity -- Antenna Gain -- Polarization -- Resonance Frequency -- Performing Antenna Power Calculations -- Effective Radiated Power -- The Travel Adventures of RF Waves -- Absorption -- Attenuation -- Dielectric Effects -- Diffraction -- Free Space Loss -- Interference -- Reflection -- Refraction -- Scattering -- Summary -- Key Terms -- Chapter 3: Working with RFID Tags -- Introduction -- Understanding Tags -- Components of a Tag -- Tag Size -- Operating Tag Frequencies -- Understanding Tag Types -- Passive Tags -- Semipassive Tags -- Active Tags -- Tag Classification -- Class 0 Tags -- Class 1 Tags -- Class 2 Tags -- Class 3 Tags -- Class 4 Tags -- Class 5 Tags -- Read Ranges of Tags -- Labeling and Placing a Tag -- Labeling a Tag -- Selecting Adhesive Types for Tags -- Placing a Tag -- Summary -- Key Terms -- Chapter 4: Working with Interrogation Zones -- Introduction -- Understanding an Interrogator -- What an Interrogator Is Made Of -- Interrogator Types -- What an Interrogator Is Good For -- Communicating With the Host -- Dealing With Dense Environments -- Understanding Collisions -- Anticollision Protocols -- Configuring Interrogation Zones -- Configuring Interrogator Commands -- Configuring Interrogator Settings -- Optimizing Interrogation Zones -- The Network Factor -- Summary -- Key Terms -- Chapter 5: Working with Regulations and Standards -- Introduction -- Understanding Regulations and Standards -- Regulations -- Standards -- Regulating Frequency Usage -- The Regulatory Regions -- Safety Regulations -- RFID Standards -- ISO Standards -- EPCglobal Standards -- Air Interface and Tag Data Standards -- Impact of Regulations and Standards -- Advantages of Regulations -- Advantages of Standards -- Disadvantages of Regulation.
Note Print version record.
Summary RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book! * For most business organizations, adopting RFID is a matter of when * The RFID services market is expected to reach $4 billion by 2008.
Subject Radio frequency identification systems.
Business logistics.
Systèmes d'identification par radiofréquence.
Logistique (Organisation)
TECHNOLOGY & ENGINEERING -- Industrial Technology.
TECHNOLOGY & ENGINEERING -- Industrial Engineering.
BUSINESS & ECONOMICS -- Production & Operations Management.
Business logistics
Radio frequency identification systems
Radiografische identificatie.
Techniek.
Databescherming.
Added Author Sanghera, Paul. Author.
Other Form: Print version: Thornton, Frank (Thorn). How to cheat at deploying and securing RFID. Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], ©2007 9781597492300 1597492302 (OCoLC)166379657
ISBN 9780080556895 (electronic bk.)
0080556892 (electronic bk.)
9781597492300
1597492302 (pbk.)
Standard No. AU@ 000043178421
AU@ 000051557351
AU@ 000053251888
AU@ 000054166997
CHNEW 001007841
DEBBG BV042305699
DEBBG BV043160134
DEBSZ 355443694
DEBSZ 405318316
DEBSZ 422156930
GBVCP 802754023
HEBIS 291513999
NZ1 12541581
NZ1 15189644
AU@ 000068980247

 
    
Available items only