Smart Cards, Tokens, Security and Applications

Nonfiction, Computers, Advanced Computing, Theory, Networking & Communications, Computer Security, General Computing
Cover of the book Smart Cards, Tokens, Security and Applications by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319505008
Publisher: Springer International Publishing Publication: May 18, 2017
Imprint: Springer Language: English
Author:
ISBN: 9783319505008
Publisher: Springer International Publishing
Publication: May 18, 2017
Imprint: Springer
Language: English

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. 

This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. 

This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers. 

More books from Springer International Publishing

Cover of the book Data Management and Analytics for Medicine and Healthcare by
Cover of the book International Policy Diffusion and Participatory Budgeting by
Cover of the book Postformal Education by
Cover of the book Neoclassical Physics by
Cover of the book Information Technology in Disaster Risk Reduction by
Cover of the book The Queer Greek Weird Wave by
Cover of the book The Political Economy of Anti-dumping Protection by
Cover of the book Radiobiology of Glioblastoma by
Cover of the book Imperial Women Writers in Victorian India by
Cover of the book Circadian Rhythms and Their Impact on Aging by
Cover of the book Resistance to Photodynamic Therapy in Cancer by
Cover of the book Medical and Surgical Complications of Sickle Cell Anemia by
Cover of the book Surgery During Natural Disasters, Combat, Terrorist Attacks, and Crisis Situations by
Cover of the book Protein-based Engineered Nanostructures by
Cover of the book Divided Loyalties? Pushing the Boundaries of Gender and Lay Roles in the Catholic Church, 1534-1829 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy