Đang chuẩn bị liên kết để tải về tài liệu:
Ebook How to cheat at deploying securing RFID: Part 2
Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Ebook How to cheat at deploying securing RFID: Part 2 includes contents: Chapter 7 Performing Site Analysis; Chapter 8 Performing Installation; Chapter 9 Working with RFID peripherals; Chapter 10 Monitoring and Troubleshooting RFID Systems; Chapter 11 Threat and Target Identifi cation; Chapter 12 RFID Attacks: Tag Encoding Attacks; Chapter 13 RFID Attacks: Tag Application Attacks; Chapter 14 RFID Attacks: Securing Communications Using RFID Middleware; Chapter 15 RFID Security: Attacking the Backend; Chapter 16 Management of RFID Security. |