Books: 13

RFID

CoverTitleYear
A Practical Guide for Military UID Applications
As RFID technology is becoming increasingly popular, the need has arisen to address the challenges and approaches to successful implementation. RFID and Auto-ID in Planning and Logistics: A Practical Guide for Military UID Applications presents the concepts for students, military personnel and contractors, more » and corporate managers to learn about RFID and other automatic information capture technologies, and their integration into planning and logistics functions. The text includes comparisons of RFID with technologies such as bar codes, satellite tags, and global positioning systems and provides a decision model for choosing the appropriate technology for a given application. By providing the histories, current use, and future applications of RFID and automatic identification technologies (AIT), the book discusses supply chain planning and logistics uses for these technologies. It addresses the fundamental relationships in RFID, including how antennae, integrated circuitry, and substrate work together. The text provides detailed information for troubleshooting design issues and an understanding of passive, semi-passive, and active tags, so an informed choice of technology type can be made. It describes the unique identification (UID) standards necessary for military contractors and how to use RFID and AIT to meet those requirements. This book is unique in the depth of material presented, making it appropriate for engineers, students, and operational personnel as a resource for foundational concepts for integrating logistics and RFID. A comprehensive reference, this volume can is an academic text, a practitioner’s handbook, and a military contractor’s UID guide for using RFID and AIT technologies. « less
2016
Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth, uninterrupted connectivity, applications to fulfill the needs of more » consumers and businesses, and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods. This book is organized into four sections, with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape, including the latest technology innovations, personal and business use trends, and mobile operating systems and applications. The second section focuses on the application development process, from strategy and process through the development phases, to production and launch. This section covers both Android and iOS application development. In the third section, the authors explore mobile access standards, network types, and infrastructure components. This section also covers proximity communications standards, including Bluetooth, NFC, and RFID. The book concludes with a look at mobile device security, including mobile encryption methods, wireless security levels, and corporate security and workforce management strategies. Throughout the book, the contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers. « less
2015
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ more » respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. * Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere * Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work * Presents methods of analysis and problem solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions « less
2014
Securing ASP.NET Web API
ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP. Fortunately, more » ASP.NET Web API provides a simple, robust security solution of its own that fits neatly within the ASP.NET MVC programming model and secures your code without the need for SOAP, meaning that there is no limit to the range of devices that it can work with if it can understand HTTP, then it can be secured by Web API. These SOAP-less security techniques are the focus of this book. « less
2013
Identify Objects in the Physical World with Arduino
If you want to experiment with radio frequency identification (RFID), this book is the perfect place to start. All you need is some experience with Arduino and Processing, the ability to connect basic circuits on a breadboard with jumper wire - and you're good to go. You'll be guided through three hands-on more » projects that let you experience RFID in action. RFID is used in various applications, such as identifying store items or accessing a toll road with an EZPass system. After you build each of the book's projects in succession, you'll have the knowledge to pursue RFID applications of your own. « less
2012
Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ more » respective areas of expertise. Coverage includes building a secure organization; cryptography; system intrusion; UNIX and Linux security; Internet security, intranet security; LAN security; wireless network security; cellular network security, RFID security, and more. This compilation of 13 chapters is tightly focused and ideally suited as an essential desk reference in this high-growth subject area. * Chapters contributed by leaders in the field covering foundational and practical aspects of system and network security, providing a new level of technical expertise not found elsewhere * Comprehensive and updated coverage of the subject area allows the reader to put current technologies to work * Presents methods of analysis and problem-solving techniques, enhancing the reader’s grasp of the material and ability to implement practical solutions « less
2010
Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available. This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field more » communication (NFC) in depth. It includes revisions on chapters devoted to the physical principles of RFID systems and microprocessors, and supplies up-to-date details on relevant standards and regulations. « less
2010
RFID-based Sensor Networking
Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a more » decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations. « less
2010
Offers a comprehensive and practical reference guide to antenna design and engineering for portable devices Antennas are often the most bulky components in many portable wireless devices such as mobile phones. Whilst the demand for ever smaller and more powerful wireless devices increases, as does the more » importance of designing and engineering smaller antennas to fit these devices. Antennas for Portable Devices provides a complete and cutting-edge guide to the design and engineering of small antennas for portable electronic devices such as mobile phone handsets, laptop computers, RFID (radio frequency identification), microwave thermal therapies devices, wearable devices, and UWB (ultra-wideband) based consumer devices. The book addresses practical engineering issues that antenna professionals have to deal with. It explains the immediate demands for existing systems; discusses the antenna technology for the latest and emerging applications, and gives comprehensive coverage of hot topics in the wireless industry. Issues including design considerations, engineering design, measurement setup and methodology, and practical applications are all covered in depth. « less
2007
RFID allows pallets and products to be scanned at a greater distance and with less effort than barcode scanning, offering superior supply-chain management efficiencies. Covers the business case for RFID, pilot programs, timelines and strategies for site assessments and deployments, testing guidelines, more » privacy and regulatory issues, and more. « less
2005