• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
How to cheat at deploying and securing RFID /

پدید آورنده
Paul Sanghera [and others].

موضوع
Business logistics.,Radio frequency identification systems.,BUSINESS & ECONOMICS-- Production & Operations Management.,Business logistics.,Databescherming.,Radio frequency identification systems.,Radiografische identificatie.,Techniek.,TECHNOLOGY & ENGINEERING-- Industrial Engineering.,TECHNOLOGY & ENGINEERING-- Industrial Technology.

رده
TK6553
.
H67
2007eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
0080556892
(Number (ISBN
9780080556895
Erroneous ISBN
1597492302
Erroneous ISBN
9781597492300

NATIONAL BIBLIOGRAPHY NUMBER

Number
b733598

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
How to cheat at deploying and securing RFID /
General Material Designation
[Book]
First Statement of Responsibility
Paul Sanghera [and others].

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Burlington, Mass. :
Name of Publisher, Distributor, etc.
Syngress Pub.,
Date of Publication, Distribution, etc.
©2007.

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (343 pages)

CONTENTS NOTE

Text of Note
Contents -- Chapter 1: Physics, Math, and RFID: Mind the Gap -- Introduction -- Some Bare-Bones Physics Concepts -- Understanding Electricity -- Understanding Magnetism -- Understanding Electromagnetism -- Electromagnetic Waves -- Types of Electromagnetic Waves -- The Electromagnetic Spectrum -- The Mathematics of RFID -- Scientific Notation -- Logarithms -- Decibel -- Units -- An Overview of RFID: How It Works -- Summary -- Chapter 2: The Physics of RFID -- Introduction -- Understanding Radio Frequency Communication -- Elements of Radio Frequency Communication -- Modulation: Don't Leave Antenna Without It -- Frequency Bands in Modulation -- Understanding Modulation Types -- Amplitude Modulation and Amplitude Shift Keying -- Frequency Modulation and Frequency Shift Keying -- Phase Modulation and Phase Shift Keying -- On-Off Keying (OOK) -- RFID Communication Techniques -- Communication Through Coupling -- Communication Through Backscattering -- Understanding Performance Characteristics of an RFID System -- Cable Loss -- Impedance -- The Voltage Standing Wave Ratio -- Noise -- Beamwidth -- Directivity -- Antenna Gain -- Polarization -- Resonance Frequency -- Performing Antenna Power Calculations -- Effective Radiated Power -- The Travel Adventures of RF Waves -- Absorption -- Attenuation -- Dielectric Effects -- Diffraction -- Free Space Loss -- Interference -- Reflection -- Refraction -- Scattering -- Summary -- Key Terms -- Chapter 3: Working with RFID Tags -- Introduction -- Understanding Tags -- Components of a Tag -- Tag Size -- Operating Tag Frequencies -- Understanding Tag Types -- Passive Tags -- Semipassive Tags -- Active Tags -- Tag Classification -- Class 0 Tags -- Class 1 Tags -- Class 2 Tags -- Class 3 Tags -- Class 4 Tags -- Class 5 Tags -- Read Ranges of Tags -- Labeling and Placing a Tag -- Labeling a Tag -- Selecting Adhesive Types for Tags -- Placing a Tag -- Summary -- Key Terms -- Chapter 4: Working with Interrogation Zones -- Introduction -- Understanding an Interrogator -- What an Interrogator Is Made Of -- Interrogator Types -- What an Interrogator Is Good For -- Communicating With the Host -- Dealing With Dense Environments -- Understanding Collisions -- Anticollision Protocols -- Configuring Interrogation Zones -- Configuring Interrogator Commands -- Configuring Interrogator Settings -- Optimizing Interrogation Zones -- The Network Factor -- Summary -- Key Terms -- Chapter 5: Working with Regulations and Standards -- Introduction -- Understanding Regulations and Standards -- Regulations -- Standards -- Regulating Frequency Usage -- The Regulatory Regions -- Safety Regulations -- RFID Standards -- ISO Standards -- EPCglobal Standards -- Air Interface and Tag Data Standards -- Impact of Regulations and Standards -- Advantages of Regulations -- Advantages of Standards -- Disadvantages of Regulation.
0

SUMMARY OR ABSTRACT

Text of Note
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book! * For most business organizations, adopting RFID is a matter of when * The RFID services market is expected to reach $4 billion by 2008.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Stock Number
CL0500000038

OTHER EDITION IN ANOTHER MEDIUM

Title
How to cheat at deploying and securing RFID.
International Standard Book Number
1597492302

TOPICAL NAME USED AS SUBJECT

Business logistics.
Radio frequency identification systems.
BUSINESS & ECONOMICS-- Production & Operations Management.
Business logistics.
Databescherming.
Radio frequency identification systems.
Radiografische identificatie.
Techniek.
TECHNOLOGY & ENGINEERING-- Industrial Engineering.
TECHNOLOGY & ENGINEERING-- Industrial Technology.

(SUBJECT CATEGORY (Provisional

BUS-- 087000
TEC-- 009060
TEC-- 018000

DEWEY DECIMAL CLASSIFICATION

Number
658
.
54
Edition
22

LIBRARY OF CONGRESS CLASSIFICATION

Class number
TK6553
Book number
.
H67
2007eb

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Sanghera, Paul.

ORIGINATING SOURCE

Date of Transaction
20201203183528.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival