000 03414nam a22005535i 4500
001 978-981-10-4352-9
003 DE-He213
005 20220801213639.0
007 cr nn 008mamaa
008 190514s2019 si | s |||| 0|eng d
020 _a9789811043529
_9978-981-10-4352-9
024 7 _a10.1007/978-981-10-4352-9
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJF
_2bicssc
072 7 _aTEC024000
_2bisacsh
072 7 _aTJF
_2thema
082 0 4 _a621.3
_223
100 1 _aLiu, Taikang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933419
245 1 0 _aElectromagnetic Information Leakage and Countermeasure Technique
_h[electronic resource] :
_bTranslated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao /
_cby Taikang Liu, Yongmei Li.
250 _a1st ed. 2019.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2019.
300 _aXIX, 246 p. 179 illus., 64 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction -- Introduction EM information fundamental and leakage mechanism -- EM information interception and reproduction -- EM information leakage countermeasure technique -- EM information leakage countermeasure material -- Computer EM information leakage and countermeasure -- EM information Data processing -- EM information leakage testing -- Standards of EM information leakage and countermeasure.
520 _aThis book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase.The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.
650 0 _aTelecommunication.
_910437
650 0 _aComputers.
_98172
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 0 _aSecurity systems.
_931879
650 1 4 _aMicrowaves, RF Engineering and Optical Communications.
_931630
650 2 4 _aComputer Hardware.
_933420
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aSecurity Science and Technology.
_931884
700 1 _aLi, Yongmei.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_933421
710 2 _aSpringerLink (Online service)
_933422
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789811043512
776 0 8 _iPrinted edition:
_z9789811043536
856 4 0 _uhttps://doi.org/10.1007/978-981-10-4352-9
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c75433
_d75433