Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Antenna Theory and Design
Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in 1998. This three-decade span has seen major expansions of antenna application areas, mainly in wireless communications. Along with technology advances has come public awareness of the presence and importance of antennas. Base station antennas are...
How to Cheat at Deploying and Securing RFID
How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.

For security
...
Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more...

Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Security in RFID and Sensor Networks (Wireless Networks and Mobile Communications)
Interest in Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) recently exploded globally in both industry and academia, but security is one of the key issues standing in the way of broad deployment of RFID and WSN systems. Broken down into easily navigable parts, this cutting-edge book offers a comprehensive discussion on...
  
   
   
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy