Electromagnetic Information Leakage and Countermeasure Technique (Record no. 75433)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03414nam a22005535i 4500 |
001 - CONTROL NUMBER | |
control field | 978-981-10-4352-9 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20220801213639.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 190514s2019 si | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
ISBN | 9789811043529 |
-- | 978-981-10-4352-9 |
082 04 - CLASSIFICATION NUMBER | |
Call Number | 621.3 |
100 1# - AUTHOR NAME | |
Author | Liu, Taikang. |
245 10 - TITLE STATEMENT | |
Title | Electromagnetic Information Leakage and Countermeasure Technique |
Sub Title | Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao / |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 2019. |
300 ## - PHYSICAL DESCRIPTION | |
Number of Pages | XIX, 246 p. 179 illus., 64 illus. in color. |
505 0# - FORMATTED CONTENTS NOTE | |
Remark 2 | Introduction -- Introduction EM information fundamental and leakage mechanism -- EM information interception and reproduction -- EM information leakage countermeasure technique -- EM information leakage countermeasure material -- Computer EM information leakage and countermeasure -- EM information Data processing -- EM information leakage testing -- Standards of EM information leakage and countermeasure. |
520 ## - SUMMARY, ETC. | |
Summary, etc | This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase.The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures. |
700 1# - AUTHOR 2 | |
Author 2 | Li, Yongmei. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | https://doi.org/10.1007/978-981-10-4352-9 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks |
264 #1 - | |
-- | Singapore : |
-- | Springer Nature Singapore : |
-- | Imprint: Springer, |
-- | 2019. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Telecommunication. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computers. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Information theory. |
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security systems. |
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Microwaves, RF Engineering and Optical Communications. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Computer Hardware. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Data Structures and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1 | |
-- | Security Science and Technology. |
912 ## - | |
-- | ZDB-2-ENG |
912 ## - | |
-- | ZDB-2-SXE |
No items available.