RFID in the Supply Chain : A Guide to Selection and Implementation
RFID in the Supply Chain : A Guide to Selection and Implementation
Click to enlarge
Author(s): Myerson, Judith M.
ISBN No.: 9780849330186
Pages: 456
Year: 200611
Format: Trade Cloth (Hard Cover)
Price: $ 213.93
Dispatch delay: Dispatched between 7 to 15 days
Status: Available (On Demand)

Supply Chain Overview Paradigm Shift in Product Traceability RFID Markets Economic Feasibility of Rolling out RFID RFID Technology Infrastructure Web-Centric Supply Chain Management challenges RFID Technology Primary Drivers Selection Guideline on Tags, Servers and Middleware RFID Implementation Examples RFID applications in Supply Chain Management Logistics Management Storing and retrieving data Two Big Questions EPC Technology in Functional Areas Perceptions of Retail Product Benefits Database CD on Local Workstation Remote Database Servers Databases in Company Merger Processes Hybrid Databases Web Services RFID Business Processes Business Process Reengineering Organizational Maturity Basic Multi-Layer Business Process Model Adaptive Multi-Layer Business Process Model Predictive Multi-Layer Business Process Model RFID Business Processes Strategies RFID Enterprise Supply Chain Systems RFID Business Process Life Cycle RFID Security, Privacy and Risk Assessment Security Policy Security of RFID Query Attacks on RFID Technology Defense in Depth Risk Assessment Appendix A: Passive RFID Technology Appendix B: Active RFID Technology Appendix C: Semi-Passive RFID Technology Appendix D: RFID Middleware Appendix E: Network/Server Interfaces Appendix F: Physical Markup Language for RFID applications Appendix G: Warehouse Management Systems Appendix H: Supply Chain Execution Systems Appendix I: Enterprise Intelligence:WebFOCUS Appendix J: Enterprise Databases Appendix K: Data synchronization: GoldenGate Appendix L: Partitioning Large Databases: Oracle Appendix M: Software Engineering Standards Appendix N: Business Process Automation: IBM Products Appendix O: Commercial Assessment Tools Appendix P: Risk Related Software Appendix Q: Sample security Policy Templates ring Organizational Maturity Basic Multi-Layer Business Process Model Adaptive Multi-Layer Business Process Model Predictive Multi-Layer Business Process Model RFID Business Processes Strategies RFID Enterprise Supply Chain Systems RFID Business Process Life Cycle RFID Security, Privacy and Risk Assessment Security Policy Security of RFID Query Attacks on RFID Technology Defense in Depth Risk Assessment Appendix A: Passive RFID Technology Appendix B: Active RFID Technology Appendix C: Semi-Passive RFID Technology Appendix D: RFID Middleware Appendix E: Network/Server Interfaces Appendix F: Physical Markup Language for RFID applications Appendix G: Warehouse Management Systems Appendix H: Supply Chain Execution Systems Appendix I: Enterprise Intelligence:WebFOCUS Appendix J: Enterprise Databases Appendix K: Data synchronization: GoldenGate Appendix L: Partitioning Large Databases: Oracle Appendix M: Software Engineering Standards Appendix N: Business Process Automation: IBM Products Appendix O: Commercial Assessment Tools Appendix P: Risk Related Software Appendix Q: Sample security Policy Templates G: Warehouse Management Systems Appendix H: Supply Chain Execution Systems Appendix I: Enterprise Intelligence:WebFOCUS Appendix J: Enterprise Databases Appendix K: Data synchronization: GoldenGate Appendix L: Partitioning Large Databases: Oracle Appendix M: Software Engineering Standards Appendix N: Business Process Automation: IBM Products Appendix O: Commercial Assessment Tools Appendix P: Risk Related Software Appendix Q: Sample security Policy Templates.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...