Electromagnetic Information Leakage and Countermeasure Technique (Record no. 75433)

000 -LEADER
fixed length control field 03414nam a22005535i 4500
001 - CONTROL NUMBER
control field 978-981-10-4352-9
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220801213639.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190514s2019 si | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9789811043529
-- 978-981-10-4352-9
082 04 - CLASSIFICATION NUMBER
Call Number 621.3
100 1# - AUTHOR NAME
Author Liu, Taikang.
245 10 - TITLE STATEMENT
Title Electromagnetic Information Leakage and Countermeasure Technique
Sub Title Translated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao /
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2019.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIX, 246 p. 179 illus., 64 illus. in color.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Introduction -- Introduction EM information fundamental and leakage mechanism -- EM information interception and reproduction -- EM information leakage countermeasure technique -- EM information leakage countermeasure material -- Computer EM information leakage and countermeasure -- EM information Data processing -- EM information leakage testing -- Standards of EM information leakage and countermeasure.
520 ## - SUMMARY, ETC.
Summary, etc This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase.The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
700 1# - AUTHOR 2
Author 2 Li, Yongmei.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://doi.org/10.1007/978-981-10-4352-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Singapore :
-- Springer Nature Singapore :
-- Imprint: Springer,
-- 2019.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Telecommunication.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computers.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data structures (Computer science).
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Information theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security systems.
650 14 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Microwaves, RF Engineering and Optical Communications.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer Hardware.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Data Structures and Information Theory.
650 24 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Security Science and Technology.
912 ## -
-- ZDB-2-ENG
912 ## -
-- ZDB-2-SXE

No items available.