IA Technology Security

  • Andrew Blyth
  • Gerald L. Kovacich
Part of the Computer Communications and Networks book series (CCN)

Abstract

This chapter addresses technology security, specifically the technical equipment available and in use to protect or attack the information assurance processes including Biometrics, EMP weapons, HERF guns, CCTV and TEMPEST.

Keywords

Dust Europe Radar Retina Assured 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • Andrew Blyth
    • 1
  • Gerald L. Kovacich
    • 2
  1. 1.School of ComputingUniversity of GlamorganPontypridd, Mid GlamorganUK
  2. 2.Whidbey IslandUSA

Personalised recommendations