Enter your mobile number below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

RFID Security 1st Edition

4.0 out of 5 stars 3 customer reviews
ISBN-13: 978-1597490474
ISBN-10: 1597490474
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used On clicking this link, a new layer will be open
$4.96 On clicking this link, a new layer will be open
Buy new On clicking this link, a new layer will be open
$54.95 On clicking this link, a new layer will be open
More Buying Choices
24 New from $28.73 24 Used from $4.96
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Top 20 lists in Books
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
$54.95 FREE Shipping. In Stock. Ships from and sold by Amazon.com. Gift-wrap available.
click to open popover

Editorial Reviews

About the Author

Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion.

In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."
NO_CONTENT_IN_FEATURE
China
Engineering & Transportation Books
Discover books for all types of engineers, auto enthusiasts, and much more. Learn more

Product Details

  • Paperback: 448 pages
  • Publisher: Syngress; 1 edition (July 7, 2005)
  • Language: English
  • ISBN-10: 1597490474
  • ISBN-13: 978-1597490474
  • Product Dimensions: 7 x 0.9 x 8.9 inches
  • Shipping Weight: 13.6 ounces (View shipping rates and policies)
  • Average Customer Review: 4.0 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #2,087,603 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By Stephen D. Hunt on December 16, 2006
Format: Paperback
The remarkable thing about his book is its accessibility. The authors have done a good job illustrating technical concepts with straightforward explanations and everyday examples. By the end of the first chapter, I felt like an expert in the inner workings of RFID, even though I started with only the foggiest notions of how it all worked.

The reader will quickly understand the differences in RFID technologies used for various purposes like access cards for entering buildings, The SpeedPass keys at Shell stations, automated toll systems on the highways, or the electronic merchandise tags at Wal-Mart.

Just differentiating those technologies makes the book worthwhile. Then the second half takes the reader on the adventure of breaking and enhancing the security of RFID systems. RFID is fundamentally susceptible to min-in-the-middle attacks and cloning. In the information security world, those threats gave rise to technologies like firewalls, virtual private networks (VPNs), and intrusion detection systems (IDS). However in most of today's RFID deployments security is downright ignored. Even systems like door access controls - themselves designed for security purposes - suffer basic security flaws.

The last section of the book explores ways to secure RFID systems. This section gets a bit technical and may only be interesting to the most devoted security professional, but if you make it through to the end you'll have a solid understanding of when to use RFID, when to avoid it, and how to ensure the greatest value. (See full review at [...])
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
Security is a growing concern in RFID. Businesses are learning the vulnerabilities inherent in writable tags; skimming and eavesdropping of RFID signals at RFID readers is a concern inside the corporation; and hacking of databases associated with RFID is a concern, as with any database.

RFID holds huge promise and is in wide use today, being used by millions of consumers as toll-payment solutions; credit cards; and key entry systems for cars. Up to now much of the focus has been on consumer privacy, i.e., on whether RFID tags will reveal too much information about items in consumers' possession.

Attention is just now being placed on the security issues that businesses deploying RFID face.

The book addresses these issues and brings to the forefront the challenges facing businesses.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
Misses the Gen 2 security topic.

This book would not even have be 200 pages if large fonts were not used, it is good for a white paper. There is only one chapter in the book which I found interesting as it talked about RFIDdump. Final chapters are decdicated to Middleware application security realted to EPCglobal network, which I would be considered as general IT security and nothing specific to RFID.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse

Set up an Amazon Giveaway

RFID Security
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: RFID Security