IA Technology Security

  • Andrew Blyth
  • Gerald L. Kovacich
Part of the Computer Communications and Networks book series (CCN)


This chapter addresses technology security, specifically the technical equipment available and in use to protect or attack the information assurance processes including Biometrics, EMP weapons, HERF guns, CCTV and TEMPEST.


Credit Card Smart Card Electromagnetic Pulse Biometric System Speaker Verification 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag London 2001

Authors and Affiliations

  • Andrew Blyth
    • 1
  • Gerald L. Kovacich
    • 2
  1. 1.School of ComputingUniversity of GlamorganPontypridd, Mid GlamorganUK
  2. 2.Whidbey IslandUSA

Personalised recommendations