RFID Security - 1st Edition - ISBN: 9781597490474, 9780080489650

RFID Security

1st Edition

Authors: Frank Thornton Chris Lanthem
Paperback ISBN: 9781597490474
eBook ISBN: 9780080489650
Imprint: Syngress
Published Date: 23rd June 2005
Page Count: 448
Tax/VAT will be calculated at check-out
51.95
31.99
39.95
Unavailable
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


Description

Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management

Key Features

  • Deloitte & Touche expects over 10 billion RFID tags to be in circulation by the end of 2005
  • Parties debating the security issue of RFID need information on the pros and cons of the technology and this is that information
  • Little competition in a market desperate for information

Readership

People in the IT security field.

Table of Contents

Chapter 1: What is RFID? Chapter 2: RFID Use Cases Chapter 3: RFID Processes Chapter 4: Threat Modeling for RFID Systems Chapter 5: Target Identification Chapter 6: RFID Processes Chapter 7: Tag Encoding Attacks Chapter 8: Tag Application Attacks Chapter 9: Attacking the Air Interface Chapter 10: Attacking Middleware Communications Chapter 11: Attacking the Directory Chapter 12: The Four Disciplines Chapter 13: Vulnerability Management Chapter 14: Identity Management in RFID Chapter 15: Trust Management Chapter 16: Threat Management

Details

No. of pages:
448
Language:
English
Copyright:
© Syngress 2005
Published:
Imprint:
Syngress
eBook ISBN:
9780080489650
Paperback ISBN:
9781597490474

About the Author

Frank Thornton

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion.

In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

Affiliations and Expertise

Owner, Blackthorn Systems, New Hampshire, USA

Chris Lanthem

Affiliations and Expertise

Security/Network Engineer for NSight Technologies, USA