Published by CRC Press 2008-03-31, 2008
ISBN 10: 1420054996 ISBN 13: 9781420054996
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
US$ 222.80
Convert currencyQuantity: 5 available
Add to basketHardcover. Condition: New.
Seller: Best Price, Torrance, CA, U.S.A.
Condition: New. SUPER FAST SHIPPING.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: New.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
US$ 262.51
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Seller: California Books, Miami, FL, U.S.A.
Condition: New.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 293.93
Convert currencyQuantity: 2 available
Add to basketCondition: New.
Seller: GreatBookPrices, Columbia, MD, U.S.A.
Condition: As New. Unread book in perfect condition.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
US$ 314.21
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Seller: GreatBookPricesUK, Woodford Green, United Kingdom
US$ 329.00
Convert currencyQuantity: 2 available
Add to basketCondition: As New. Unread book in perfect condition.
Seller: Revaluation Books, Exeter, United Kingdom
US$ 409.98
Convert currencyQuantity: 2 available
Add to basketHardcover. Condition: Brand New. 1st edition. 712 pages. 9.84x7.09x1.73 inches. In Stock.
Seller: AHA-BUCH GmbH, Einbeck, Germany
US$ 389.74
Convert currencyQuantity: 1 available
Add to basketBuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - From basic concepts to future research directions, the RFID Handbook provides technical information about all aspects of RFID technology. This book presents current and emerging applications in supply chain management, field reporting and communication systems, the pharmaceutical industry, video surveillance, and information services. It also describes various state-of-the-art technologies from data management systems to transient and persistent electronic product codes. Additionally, the book addresses security and privacy issues with in-depth discussions of authentication mechanisms, inter-domain security, and encryption schemes, among other topics.