Frank Thornton, Chris Lanthem
立即出貨 (庫存 < 3)
貴賓價: $1,121Pattern Recognition, 3/e(IE)
貴賓價: $1,068An Introduction to Formal Languages and Automata, 4/e
貴賓價: $1,068Cryptography and Network Security, 4/e (IE) (美國版ISBN:0131873164) (平裝)
售價: $1,584Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers
貴賓價: $1,686Pro WCF: Practical Microsoft SOA Implementation
售價: $613Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0
售價: $865Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Protect the Supply Chain
RFID Security reveals the motives of RFID hackers and then explains how to protect systems. Coverage includes how to prevent attackers from exploiting security breaches for monetary gain (hacking a store’s RFID system would allow a hacker to lower the pricing on any product); how to protect the supply chain (malicious/mischievous hackers can delete/alter/modify all identifying information for an entire shipment of products); and how to protect personal privacy (privacy advocates fear that RFID tags embedded in products, which continue to transmit information after leaving a store, will be used to track consumer habits).
- Understand RFID Standards
Learn the various country, application, and vendor frequencies and classes of tags.
- Manipulate Tag Data
See how someone looking to steal multiple items could change the data on the tags attached to those items.
- Implement Security Measures
Understand the types of RFID attacks to see how someone might try to steal a single object or even try to prevent sales at a single store or chain of stores.
- Review Tag Encoding and Tag Application Attacks
Review man-in-the-middle attacks, as well as chip clones, tracking, and disruption attacks to RFID systems.
- Prevent Unauthorized Access
Ensure secure communications by deploying RFID middleware.
- Prevent Backend Communication Attacks
Prevent man-in-the-middle and TCP replay attacks on the backend.
- Assess the Risk and Vulnerability of Implementing RFID
Learn the questions to ask to determine the risks to your company.