Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title page Table of Contents Copyright Dedication Biography Foreword Preface Acknowledgments Part I: Threats, risk and risk assessments
Chapter 1: Information Security Threats and Risk
Abstract Introduction Information security risk Information security risk assessments Organizing information security risk assessments General risk factors for the compromise of signals Estimating the likelihood component of risk Summary
Chapter 2: Modeling Information Security Risk
Abstract Introduction Basic functions and units of measurement Linearity and nonlinearity Linear, areal, and volumetric density Geometry and parametric scaling Exponential and logistic growth Summary
Part II: Scientific fundamentals
Chapter 3: Physics and Information Security
Abstract Introduction Waves Wave energy and power Constructive and destructive interference Resonance Diffraction and lenses Antennae and gain Point sources of radiating energy Summary
Chapter 4: Electromagnetic Waves
Abstract Introduction Electromagnetic fields and flux Vectors Maxwell’s equations Maxwell’s equations and information security Summary
Chapter 5: Noise, Interference, and Emanations
Abstract Introduction Thermal noise Shot noise Emanations and electromagnetic interference Radiating circuits Circuit element models and electric fields Summary
Part III: The compromise of signals
Chapter 6: Signals and Information Security
Abstract Introduction Modulation Signal averaging Risk factors for signal compromise Introduction to information theory Information theory and information security Summary
Chapter 7: The Compromise of Electromagnetic Signals
Abstract Introduction A naïve attack Assumptions on attackers and attack parameters Broadband signal detection A security limit on emanations Anatomy of a remote attack 1: the computer video display interface Anatomy of a remote attack 2: keyboard emanations Summary
Chapter 8: Countermeasures to Electromagnetic Signal Compromises
Abstract Introduction Electromagnetic shielding Magnetic shielding Grounding to reduce emanations Signal attenuation Summary
Chapter 9: Visual Information Security
Abstract Introduction Fundamentals of optics and optical equipment The resolution limit Optical attacks Telescopes Summary
Chapter 10: Audible Information Security
Abstract Introduction Audible noise and interference The effects of noise and distance Audible signal propagation Audible signal detection devices Audible signal shielding Summary
Part IV: Information technology risk
Chapter 11: Information Technology Risk Factors
Abstract Introduction Business practices and organizational culture Security governance User behavior The physical security of information assets Information technology implementation Information security policies and information technology standards Summary
Chapter 12: Information Technology Risk Measurements and Metrics
Abstract Introduction Information security risk measurement and metrics criteria Security risk dimensions Introduction to spatiotemporal risk measurements Spatiotemporal risk measurements and metrics Correlation measurements and metrics The NIST Cybersecurity Framework Summary
Chapter 13: Special Information Technology Risk Measurements and Metrics
Abstract Introduction Metrics for password resilience Metrics for network infections: a scale-free model Metrics in frequency and time: the Fourier transform Metrics to determine the probability of protection Metrics for intrusion detection: the Markov process Summary
Part V: The physical security of information assets
Chapter 14: Physical Security Controls
Abstract Introduction Authenticating identity Verifying authorization Assessing affiliation Technical surveillance countermeasures Summary
Chapter 15: Data Centers: A Concentration of Information Security Risk
Abstract Introduction A (high-level) data center physical security strategy The security of virtualization An electromagnetic threat to data centers Summary
Epilogue Appendix A: The Divergence and Curl Operators Appendix B: Common Units of Electricity and Magnetism Appendix C: Capacitive and Inductive Coupling in Circuits Appendix D: Intermediate Frequency (IF) Filtering of Signals Appendix E: An Indicative Table of Contents for an Information Security Policy Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion