Flylib.com
RFID Field Guide: Deploying Radio Frequency Identification Systems
RFID Field Guide: Deploying Radio Frequency Identification Systems
ISBN: 0131853554
EAN: 2147483647
Year: 2006
Pages: 112
Authors:
Manish Bhuptani
,
Shahram Moradpour
BUY ON AMAZON
RFID Field Guide: Deploying Radio Frequency Identification Systems
Table of Contents
Copyright
About the Authors
Preface
Part I: What Is RFID?
Chapter 1. A Better Way of Doing Things
Security and Authentication
Safety
Convenience
Process Efficiency
Summary
Chapter 2. The History and Evolution of RFID
RFID Technology and the Radio
The Early Days of RFID
From Detection to Unique Identification
RFID Flourishes Across the Globe
Summary
Chapter 3. Components of RFID Systems
Operational Description of RFID Systems
Hardware Components
Software Components
The EPCglobal Network
Summary
Part II: How to Deploy RFID
Chapter 4. Standards Related to RFID
Role of Standards in Technology Advancement and Adoption
Standards and RFIDAn Overview of EPCglobal
ISO and RFID Standards
Other Standardization Initiatives
Recommendations for the Practitioner
Summary
Chapter 5. Framework for Deployment
Introducing RFID Deployment Framework
Identify Business Problem
Define and Pilot Solution
Build and Deploy Solution
Sustain and Improve
Knowledge Base
Summary
Chapter 6. Organizational Mobilization
Achieving Organizational Mobilization
Provide Leadership Focus
Communicate Shared Vision
Engage Support and Resistance
Institutionalize Results and Lessons
Summary
Chapter 7. Cost-Benefit Analysis
Analyzing Benefits
Elements of Cost
Cost-Benefit Characterization of Selected Applications
Summary
Chapter 8. Vendor Considerations and Landscape
Vendor Selection Approach
Vendor Comparison Criteria
Vendor Categories
Vendor Guide
Summary
Part III: The Path Ahead
Chapter 9. Mandates As Business Catalysts
Wal-Mart and RFID
U.S. Department of Defense and RFID
Recommendations for Suppliers of Wal-Mart, Other Retailers, and the DoD
RFID Initiatives at Other Organizations
Summary
Chapter 10. Security and Privacy
Distinguishing Between Security and Privacy Issues
Security Challenges
Privacy Considerations
Summary
Chapter 11. Emerging Trends in RFID
Technological Advancements
Business Process Innovations
Evolving Standards and Legislation
Consumer Application Innovations
Summary
Appendix A
Case Study: Michigan Department of Agriculture
Case Study: Sun Microsystems
Case Study: Operation Enduring Freedom Operation Iraqi Freedom (OEFOIF)
Case Study: Woolworths, Plc.
Case Study: Smart Secure TradelanesPhase One Review
Appendix B
The Sun EPCglobal Network Architecture
References and Recommended Reading
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Z
RFID Field Guide: Deploying Radio Frequency Identification Systems
ISBN: 0131853554
EAN: 2147483647
Year: 2006
Pages: 112
Authors:
Manish Bhuptani
,
Shahram Moradpour
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Telecommunications and Network Security
Operations Security
Legal, Regulations, Compliance, and Investigations
Appendix F Security Control Catalog
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Complex Application with GNU make
Streams and Files
Deleting or Renaming a File
Computing Variance, Standard Deviation, and Other Statistical Functions
Initializing Shared Resources Once
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 68. Cope with Unexpected Redo
Hack 70. Combine Your Queries
Hack 81. Build Decision Tables
Hack 99. Dont Run Out of Disk Space
Visual C# 2005 How to Program (2nd Edition)
Self-Review Exercises
Publishing and Consuming Web Services
Web Resources
Establishing a Simple TCP Server (Using Stream Sockets)
Self-Review Exercises
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Installing the Designer Client
Troubleshooting
Create a Custom Popup Dialog Box
Display an Are You Sure? Message
Migrating Data
MPLS Configuration on Cisco IOS Software
BGP PE-CE Routing Protocol Overview, Configuration, and Verification
Case Study-Hub and Spoke MPLS VPN Network with Sites Using Same AS Numbers
Case Study-Inter-AS Implementing Route-Reflector and BGP Confederation in Provider Networks
Local Switching
Case Study 3: Implementing Layer 2 VPNs over Inter-AS Topologies Using Layer 2 VPN Pseudo-Wire Switching
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies