Flylib.com
RFID Sourcebook (paperback)
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors:
Sandip Lahiri
BUY ON AMAZON
RFID Sourcebook
Table of Contents
Copyright
Preface
Acknowledgments
Chapter1.Technology Overview
Section 1.1. Fundamental Concepts
Section 1.2. RFID System
Section 1.3. Conclusion
Chapter2.Advantages of the Technology
Section 2.1. Advantages of RFID
Section 2.2. Conclusion
Chapter3.Limitations of the Technology
Section 3.1. Limitations of RFID
Section 3.2. Conclusion
Chapter4.Application Areas
Section 4.1. Prevalent Application Types
Section 4.2. Emerging Application Types
Section 4.3. Conclusion
Chapter5.Privacy Concerns
Section 5.1. Core Issue
Section 5.2. What Are Privacy Rights?
Section 5.3. Resolution Attempts
Section 5.4. Conclusion
Chapter6.RFID Versus Bar Code
Section 6.1. Bar Codes
Section 6.2. Advantages of RFID Over Bar Codes
Section 6.3. Advantages of Bar Codes Over RFID
Section 6.4. Disadvantages of RFID and Bar Codes
Section 6.5. RFID Will Replace Bar Codes Soon
Section 6.6. Conclusion
Chapter7.The RFID Strategy
Section 7.1. Why an RFID Strategy?
Section 7.2. Strategy Guidelines
Section 7.3. RFID Strategy to Deployment Strategy
Section 7.4. Conclusion
Chapter8.Creating Business Justification for RFID
Section 8.1. Slap-and-Ship Type Application
Section 8.2. Step 1: Forming the Business Justification Team
Section 8.3. Step 2: Determining Potential Application Areas
Section 8.4. Step 3: Building Business Cases
Section 8.5. Step 4: Determining Priorities
Section 8.6. Step 5: Creating Roadmaps
Section 8.7. Conclusion
Chapter9.Designing and Implementing an RFID Solution
Section 9.1. System Architecture
Section 9.2. Technical Variables
Section 9.3. Implementation Notes
Section 9.4. Conclusion
Chapter10.Standards
Section 10.1. ANSI Standards
Section 10.2. AIAG Standard
Section 10.3. EANUCC Standard
Section 10.4. EPCglobal Specification
Section 10.5. U.S. Department of Defense (DoD)
Section 10.6. ISO (International Organization for Standardization)
Section 10.7. ETSI (European Telecommunications Standards Institute)
Section 10.8. ERO (European Radiocommunications Office)
Section 10.9. The Open Services Gateway Initiative
Section 10.10. Contact Information of Standards Bodies
Chapter11.Closing Thoughts
Section 11.1. Current Hurdles to Using RFID
Section 11.2. Comments and Observations
Section 11.3. Conclusion
AppendixA.RFID Vendors, News Sources, and Conferences
Section A.1. RFID Vendors
Section A.2. RFID News Sources
Section A.3. RFID Conferences
AppendixB.Passive Tag Manufacturing Overview
Section B.1. Die
Section B.2. Tag Antenna
Section B.3. Inlet
Section B.4. Inlet Conversion
Glossary
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
Z
RFID Sourcebook (paperback)
ISBN: 0132762021
EAN: 2147483647
Year: 2006
Pages: 100
Authors:
Sandip Lahiri
BUY ON AMAZON
MySQL Stored Procedure Programming
Using SQL in Stored Programming
Using Unbounded SELECT Statements
Performing Dynamic SQL with Prepared Statements
Conclusion
Calling Stored Programs from Application Code
CompTIA Project+ Study Guide: Exam PK0-003
Schedule Planning
Other Planning Processes
Project Control
Appendix A Systems Development Life Cycle
Appendix B Standard IT Project Documents
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 4.5 How to use OpenSSH Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Step 6.1 Port Forwarding
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
IDS and IPS Internals
Snort
Incident Response
Security Business Issues
Web Systems Design and Online Consumer Behavior
Chapter IV How Consumers Think About Interactive Aspects of Web Advertising
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VI Web Site Quality and Usability in E-Commerce
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter XII Web Design and E-Commerce
MPLS Configuration on Cisco IOS Software
Frame-Mode MPLS Configuration and Verification
Command Reference
Case Study-Multi-Homed Inter-AS Provider Network
Deployment Scenarios with CSC Architecture
Hierarchical VPLS-Distributed PE Architecture
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies