000 | 03414nam a22005535i 4500 | ||
---|---|---|---|
001 | 978-981-10-4352-9 | ||
003 | DE-He213 | ||
005 | 20220801213639.0 | ||
007 | cr nn 008mamaa | ||
008 | 190514s2019 si | s |||| 0|eng d | ||
020 |
_a9789811043529 _9978-981-10-4352-9 |
||
024 | 7 |
_a10.1007/978-981-10-4352-9 _2doi |
|
050 | 4 | _aTK5101-5105.9 | |
072 | 7 |
_aTJF _2bicssc |
|
072 | 7 |
_aTEC024000 _2bisacsh |
|
072 | 7 |
_aTJF _2thema |
|
082 | 0 | 4 |
_a621.3 _223 |
100 | 1 |
_aLiu, Taikang. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933419 |
|
245 | 1 | 0 |
_aElectromagnetic Information Leakage and Countermeasure Technique _h[electronic resource] : _bTranslated by Liu Jinming, Liu Ying, Zhang Zidong, Liu Tao / _cby Taikang Liu, Yongmei Li. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aSingapore : _bSpringer Nature Singapore : _bImprint: Springer, _c2019. |
|
300 |
_aXIX, 246 p. 179 illus., 64 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
505 | 0 | _aIntroduction -- Introduction EM information fundamental and leakage mechanism -- EM information interception and reproduction -- EM information leakage countermeasure technique -- EM information leakage countermeasure material -- Computer EM information leakage and countermeasure -- EM information Data processing -- EM information leakage testing -- Standards of EM information leakage and countermeasure. | |
520 | _aThis book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase.The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures. | ||
650 | 0 |
_aTelecommunication. _910437 |
|
650 | 0 |
_aComputers. _98172 |
|
650 | 0 |
_aData structures (Computer science). _98188 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aMicrowaves, RF Engineering and Optical Communications. _931630 |
650 | 2 | 4 |
_aComputer Hardware. _933420 |
650 | 2 | 4 |
_aData Structures and Information Theory. _931923 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aLi, Yongmei. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _933421 |
|
710 | 2 |
_aSpringerLink (Online service) _933422 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9789811043512 |
776 | 0 | 8 |
_iPrinted edition: _z9789811043536 |
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-981-10-4352-9 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c75433 _d75433 |