59 resultater (0,37824 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

RFID - Steven Shepard - Bog - McGraw-Hill Education - Europe - Plusbog.dk

RFID in Logistics - Erick C. Jones - Bog - Taylor & Francis Ltd - Plusbog.dk

RFID Metrics - William Oliver Hedgepeth - Bog - Taylor & Francis Ltd - Plusbog.dk

RFID and the Internet of Things - Sergei Evdokimov - Bog - now publishers Inc - Plusbog.dk

RFID - S Jaya Krishna - Bog - ICFAI Books - Plusbog.dk

RFID and Sensor Networks - - Bog - Taylor & Francis Ltd - Plusbog.dk

RFID and Sensor Networks - - Bog - Taylor & Francis Ltd - Plusbog.dk

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration. Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples. This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

DKK 699.00
1

Security in RFID and Sensor Networks - - Bog - Taylor & Francis Ltd - Plusbog.dk

Security in RFID and Sensor Networks - - Bog - Taylor & Francis Ltd - Plusbog.dk

In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies. Exposes Security Risks The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. Offers Viable Solutions In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.

DKK 590.00
1

RFID in Manufacturing - Uwe Kubach - Bog - Springer-Verlag Berlin and Heidelberg GmbH & Co. KG - Plusbog.dk

Tag Counting and Monitoring in Large-Scale RFID Systems - Lin Chen - Bog - Springer Nature Switzerland AG - Plusbog.dk

Tag Counting and Monitoring in Large-Scale RFID Systems - Lin Chen - Bog - Springer International Publishing AG - Plusbog.dk

RFID in Libraries - Lori Bowen Ayre - Bog - American Library Association - Plusbog.dk

RFID and Auto-ID in Planning and Logistics - Erick C. (university Of Texas Jones - Bog - Taylor & Francis Ltd - Plusbog.dk

RFID and Auto-ID in Planning and Logistics - Erick C. (university Of Texas Jones - Bog - Taylor & Francis Ltd - Plusbog.dk

As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides a decision model for choosing the appropriate technology for a given application. By providing the histories, current use, and future applications of RFID and automatic identification technologies (AIT), the book discusses supply chain planning and logistics uses for these technologies. It addresses the fundamental relationships in RFID, including how antennae, integrated circuitry, and substrate work together. The text provides detailed information for troubleshooting design issues and an understanding of passive, semi-passive, and active tags, so an informed choice of technology type can be made. It describes the unique identification (UID) standards necessary for military contractors and how to use RFID and AIT to meet those requirements. This book is unique in the depth of material presented, making it appropriate for engineers, students, and operational personnel as a resource for foundational concepts for integrating logistics and RFID. A comprehensive reference, this volume can is an academic text, a practitioner’s handbook, and a military contractor’s UID guide for using RFID and AIT technologies.

DKK 764.00
1

Data Security in Internet of Things Based RFID and WSN Systems Applications - - Bog - Taylor & Francis Ltd - Plusbog.dk

Physical Anti-Collision in RFID Systems - Xiaolei Yu - Bog - Springer Verlag, Singapore - Plusbog.dk

RCS Synthesis for Chipless RFID - Etienne Perret - Bog - ISTE Press Ltd - Elsevier Inc - Plusbog.dk

Design and Construction of an RFID-enabled Infrastructure - Nagabhushana Prabhu - Bog - Taylor & Francis Ltd - Plusbog.dk

Design and Construction of an RFID-enabled Infrastructure - Nagabhushana Prabhu - Bog - Taylor & Francis Ltd - Plusbog.dk

Internet 2.0 (previously called the Internet of Things) presents a tantalizing vision of bridging the cyber and physical worlds to forge a seamless planet-wide infrastructure in which cyber resources and physical objects can interact without human intervention. The technology needed to build the infrastructure already exists. However, more than a decade after the vision of Internet 2.0 was articulated, it remains largely unrealized except in isolated settings. Following a background discussion, Design and Construction of an RFID-enabled Infrastructure: the Next Avatar of the Internet addresses three questions: what are the barriers to the emergence of Internet 2.0 as a global infrastructure? What are the features that Internet 2.0 architecture must have if it is to become a successful global infrastructure?How can one build a prototype of Internet 2.0? The quest for answers to the above questions threads the narrative through the birthing process and maturation of two successful global infrastructures—the Internet and the web. Based on a review of the design philosophies underlying the Internet and the Web, their histories and the strategic stewardship that midwifed their births, the book presents the architectural guidelines for the Internet 2.0 infrastructure as well as a blueprint for the construction of its prototype. The discussion in the book is consolidated into a list of technical and strategic guidelines intended to facilitate the incubation of Internet 2.0.

DKK 674.00
1

Financial Cryptography and Data Security - - Bog - Springer-Verlag Berlin and Heidelberg GmbH & Co. KG - Plusbog.dk

Financial Cryptography and Data Security - - Bog - Springer-Verlag Berlin and Heidelberg GmbH & Co. KG - Plusbog.dk

WLC Preface.- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices.- Lighten Encryption Schemes for Secure and Private RFID Systems.- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags.- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.- Reliable Food Traceability Using RFID Tagging.- Lightweight Cryptography and DPA Countermeasures: A Survey.- Securing the Use of RFID-Enabled Banknotes.- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports.- RLCPS Preface.- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications.- A Secure and Privacy-Preserving Targeted Ad-System.- Cryptographic Cloud Storage.- Extending IPsec for Efficient Remote Attestation.- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions.- How to Evaluate the Security of Real-Life Cryptographic Protocols?.- WECSR Preface.- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals.- A Case Study on Measuring Statistical Data in the Tor Anonymity Network.- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets.- Ethical Proactive Threat Research.- A Framework for Understanding and Applying Ethical Principles in Network and Security Research.- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects.- Ethical Guidelines for Computer Security Researchers: "Be Reasonable".

DKK 426.00
1

Foundations and Practice of Security - - Bog - Springer International Publishing AG - Plusbog.dk

Big Data Computing and Communications - - Bog - Springer International Publishing AG - Plusbog.dk