Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in
1998. This three-decade span has seen major expansions of antenna application areas,
mainly in wireless communications. Along with technology advances has come public
awareness of the presence and importance of antennas. Base station antennas are... | | How to Cheat at Deploying and Securing RFIDRFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.
For security... | | Seven Deadliest Wireless Technologies Attacks
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more... |