A handbook on DIY electronic security and espionage:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London, UK
Elektor
2021
|
Ausgabe: | first published |
Schriftenreihe: | Elektor books
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverzeichnis Seite 216-219 |
Beschreibung: | 229 Seiten Illustrationen, Diagramme 23.5 cm x 17 cm |
ISBN: | 9783895764653 3895764655 |
Internformat
MARC
LEADER | 00000nam a22000008c 4500 | ||
---|---|---|---|
001 | BV047558315 | ||
003 | DE-604 | ||
005 | 20230516 | ||
007 | t | ||
008 | 211025s2021 gw a||| |||| 00||| eng d | ||
015 | |a 21,N42 |2 dnb | ||
016 | 7 | |a 1243189916 |2 DE-101 | |
020 | |a 9783895764653 |c pbk: EUR 34.95 (DE) (freier Preis), EUR 36.00 (AT) (freier Preis), CHF 37.95 (freier Preis) |9 978-3-89576-465-3 | ||
020 | |a 3895764655 |9 3-89576-465-5 | ||
024 | 3 | |a 9783895764653 | |
028 | 5 | 2 | |a Bestellnummer: 19903 |
035 | |a (OCoLC)1277295451 | ||
035 | |a (DE-599)DNB1243189916 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-NW | ||
049 | |a DE-83 |a DE-29T |a DE-573 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZN 2800 |0 (DE-625)157280: |2 rvk | ||
084 | |a ZN 4000 |0 (DE-625)157336: |2 rvk | ||
100 | 1 | |a Matic, Luka |d 1976- |e Verfasser |0 (DE-588)1267636629 |4 aut | |
245 | 1 | 0 | |a A handbook on DIY electronic security and espionage |c Luka Matic |
246 | 1 | 3 | |a A handbook on Do it yourself electronic security and espionage |
246 | 1 | 3 | |a A handbook on Do-it-yourself electronic security and espionage |
250 | |a first published | ||
264 | 1 | |a London, UK |b Elektor |c 2021 | |
300 | |a 229 Seiten |b Illustrationen, Diagramme |c 23.5 cm x 17 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Elektor books | |
500 | |a Literaturverzeichnis Seite 216-219 | ||
650 | 0 | 7 | |a Technische Sicherheit |0 (DE-588)4059233-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hardware |0 (DE-588)4023422-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
653 | |a Software | ||
653 | |a Security | ||
653 | |a Espionage | ||
653 | |a Hardware | ||
653 | |a Cryptosystem | ||
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Technische Sicherheit |0 (DE-588)4059233-9 |D s |
689 | 0 | 2 | |a Hardware |0 (DE-588)4023422-8 |D s |
689 | 0 | 3 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | |5 DE-604 | |
710 | 2 | |a Elektor Verlag GmbH |0 (DE-588)1065539746 |4 pbl | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-89576-466-0 |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032933814&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032933814 |
Datensatz im Suchindex
_version_ | 1804182883533848576 |
---|---|
adam_text | TABLE
OF
CONTENTS
CHAPTER
1
YY
ALL
SECURITY
PROBLEMS
SOLVED
PERFECTLY
-
OR
PERHAPS
NOT?
.............................
10
1.1
YY
POPULAR
MISCONCEPTIONS
.................................................................................................
11
1.1.1
YY
(MIS)UNDERSTANDING
THE
BASIC
PRINCIPLES
OF
SECURITY
..........................................
11
1.1.2
YY
WHY
DESIGN
SOMETHING
NEW?
.............................................................................
12
1.1.3
YY
MOORE S
LAW
AND
ITS
COROLLARY
ON
SECURITY
.........................................................
14
1.1.4
YY
ESPIONAGE
IN
THE
PAST
AND
PRESENT
......................................................................
14
1.2
YY
OMNIPRESENT,
UNRECOGNISED,
AND
UNADDRESSED
PROBLEMS
..........................................
17
1.2.1
YY
LIABILITY
PROBLEM
.................................................................................................
17
1.2.2
YY
FAILURE
TO
RECOGNISE
IMPORTANT
PROBLEMS
TO
SOLVE
.............................................
18
1.2.3
YY
BLACK
BOX
PROBLEM:
WHY
SHOULD
I
CARE
HOW
MY
SUPER-GIZMO
GETS
ITS
WORK
DONE?
.................................................................................................................................
22
1.2.4
YY
RELUCTANCE
TO
PROPERLY
ADDRESS
THE
IMPOSSIBLE
SCENARIOS
...........................
22
1.2.5
YY
THE
PROBLEMS
THAT
ELECTRONIC
ENGINEERS
CAN T
SOLVE
..........................................
24
1.3
YY
LOW
TECH
RULES
-
VERY
UNINTUITIVE
................................................................................
25
1.4
YY
MY
DESIGN
PHILOSOPHY
AND
APPROACH
TO
SECURITY
.......................................................
28
CHAPTER
2
YY
METHODS
OF
ATTACK
..............................................................................................
31
2.1
YY
METHODS
TO
COUNTERACT
.................................................................................................
31
2.2
YY
MATHEMATICAL
CRYPTO-ANALYSIS
.......................................................................................
32
2.2.1
YY
BRUTE-FORCE
...........................................................................................................
34
2.2.2
YY
ATTACKS
ON
RNGS
.................................................................................................
36
2.3
YY
BUFFER-OVERFLOW
.............................................................................................................
37
2.3.1
YY
TYPES
OF
BUFFER-OVERFLOW
ATTACKS
........................................................................
38
2.3.2
YY
VON
NEUMANN S
VS.
HARVARD
ARCHITECTURE
.........................................................
39
2.4
YY
SIDE-CHANNEL
ATTACKS
...................................................................................................
40
2.4.1
YY
TEMPEST
-
A
TYPE
OF
SIDE-CHANNEL
.....................................................................42
2.4.2
YY
HOW
TO
DEFEND
ON
A
DIY
BUDGET?
........................................................................49
2.5
YY
HARDWARE
TROJANS
........................................................................................................
54
2.5.1
YY
TYPES
OF
HARDWARE
TROJAN
....................................................................................
55
2.5.2
YY
EAST
GERMAN
Z80
CLONE
VS.
THE
NEWEST
LONM
FPGA
........................................
56
2.5.3
YY
PLANTING,
DETECTING,
AND
COUNTERMEASURES
......................................................
58
2.6
YY
EXPLOITING
INHERENTLY
INSECURE
PHYSICAL
PROPERTIES
....................................................
61
2.6.1
YY
DELETING
HDD
AND
SSD
DEVICES
..........................................................................
62
2.6.2
YY
RECOVERING
DATA
FROM
OLD
(E)EPROMS
................................................................
63
YY
7
2.6.3
YY
SRAM
AND
DRAM
DATA
REMANENCE
......................................................................
68
2.6.4
YY
COLD
BOOT
ATTACKS
..................................................................................................
72
2.6.5
YY
WHAT
CAN
WE
DO
DIY?
..........................................................................................
74
CHAPTER
3
YY
RANDOM
NUMBER
GENERATORS
.............................................................................
78
3.1
YY
A
GOOD
RNG
AS
A
NECESSARY
LINK
IN
THE
SECURITY
CHAIN
...............................................
78
3.1.1
YY
DEFINING
SPECS
FOR
A
GOOD
RNG
FOR
USE
IN
A
CRYPTO
SYSTEM
..............................
78
3.1.2
YY
NIST
TESTING
.........................................................................................................
79
3.1.3
YY
OTHER
WAYS
TO
USE
NIST
RNG
TESTS
FOR
SECURITY
EVALUATION
..............................
81
3.2
YY
TYPES
OF
RNGS
AVAILABLE
TODAY
AND
POSSIBLE
PROBLEMS
.............................................
82
3.2.1
YY
PSEUDO-RANDOM
NUMBERS
GENERATORS
(PRNG)
..................................................
82
3.2.2
YY
HIGHLY
INTEGRATED
TRNGS
.....................................................................................84
3.2.3
YY
BLACK-BOX
TRNGS
..................................................................................................
84
3.3
YY
ELEKTOR
TRNG
SOLVES
SOME
PROBLEMS,
BUT
....................................................................
85
CHAPTER
4
YY
CRYPTOGRAPHY
ON
PAPER,
COMPUTER,
AND
IN
THE
REAL
WORLD
...........................
90
4.1
YY
WHY
DO
CRYPTOSYSTEMS
FAIL?
..........................................................................................
90
4.1.1
YY
THE
FAMOUS
ENIGMA
.............................................................................................
90
4.1.2
YY
VENONA
AFFAIR
.......................................................................................................
91
4.1.3
YY
MATHEMATICS
IS
PERFECT
-
WELL
ALMOST
...................................................................
94
4.1.4
YY
HUMANS
ARE
DEFINITELY
NOT
PERFECT
......................................................................
95
4.2
YY
MORE
PROBLEMS
AND
MORE
MISCONCEPTIONS
....................................................................
96
4.2.1
YY
LOOSE
DEFINITIONS
..................................................................................................
96
4.2.1.1
YY
LET S
TRY
TO
DEFINE
ENCRYPTION
STRENGTH
......................................................
98
4.2.1.2
YY
WHAT
IS
ENCRYPTION,
AND
WHAT
IS
NOT?
.......................................................
99
4.2.2
YY
SYMMETRIC
AND
ASYMMETRIC
ENCRYPTION
..........................................................
101
4.2.3
YY
PGP
AFFAIR
............................................................................................................
103
4.2.4
YY
QUANTUM
COMPUTERS
...........................................................................................
105
4.2.5
YY
REVERSING
AN
IMPLICATION
AND
T-COM
PAYPHONES
.............................................
106
4.3
YY
BLACK-BOX
CRYPTOGRAPHY
........................................................................
110
4.3.1
YY
CRYPTO
AG
AFFAIRS
.............................................................................................
110
4.4
YY
ELEKTOR
OTP
CRYPTO
SHIELD
...........................................................................................
112
4.4.1
YY
KEY
DISTRIBUTION
PROBLEMS
.................................................................................
117
4.5
YY
TAMPER-EVIDENT
BOX
SOLVES
SOME
PROBLEMS,
BUT
.......................................................
119
CHAPTER
5
YY
A
FEW
MORE
CHEAP
AND
HIGHLY
SECURE
GADGETS
.............................................
124
5.1
YY
SD
CARD-TO-SD
CARD
COPIER
........................................................................................
124
YY
8
5.2
YY
SD
CARD-TO-CASSETTE
TAPE
COPIER
................................................................................
126
5.3
YY
ZMC80
SYSTEM
BY
LEE
ALAN
HART
................................................................................
131
5.3.1
YY
CRYPTO
DEVELOPMENT
SHIELD
ADD-ON
.................................................................
135
5.3.2
YY
BUFFER-OVERFLOW
PROTECTION
ON
HARDWARE
LEVEL
................................................
138
5.3.3
YY
STACK
SMASHING
AND
CODE
OBFUSCATION
............................................................
140
5.4
YY
MG-FLASH
ANALOGUE
MEMORY
FOR
TAMPER-EVIDENT
BOX
................................................
141
5.5
YY
SECURITY
BY
OBSCURITY
.................................................................................................
145
5.6
YY
MYNOR
CPU-LESS
COMPUTER
BY
DENNIS
KUSCHEL
.......................................................
146
CHAPTER
6
YY
HANDS-ON!
.........................................................................................................
150
6.1
YY
TEMPEST
ATTACK
DEMOS
...............................................................................................
150
6.1.1
YY
TEMPEST
ON
A
DOT-MATRIX
PRINTER
..................................................................
150
6.1.2
YY
TEMPEST
ON
A
PS/2
OR
AN
USB
KEYBOARD
......................................................
155
6.2
YY
BUFFER-OVERFLOW
ATTACK
DEMOS
..................................................................................
158
6.2.1
YY
SMASHING
THE
STACK
ON
ZMC
Z80
..................................................................
162
6.2.2
YY
INJECTING
AND
EXECUTING
AN
ARBITRARY
CODE
.....................................................
164
6.3
YY
SRAM
BURNT-IN
DATA
RECOVERY
..................................................................................
170
6.4
YY
COLD-BOOT
ATTACK
DEMO
............................................................................................
178
CHAPTER
7
YY
A
FEW
MORE
IDEAS
TO
WORK
ON
........................................................................
182
7.1
YY
SIGSALY-2
RELOADED
...............................................................................................
182
7.2
YY
MICROWAVE
OVEN
-
AN
INNOCUOUS
MACHINE?
..............................................................
188
7.3
YY
FUNCARD
SYSTEM
FOR
SECURE
DIGITAL
SIGNING
AND
DECRYPTION
...................................
191
7.4
YY
TEMPEST-PROOF
TERMINAL
............................................................................................
200
7.5
YY
FALSE
MORSE
SIGNATURE
GENERATOR
................................................................................
201
7.6
YY
ENCRYPTED
ROMS
.........................................................................................................
205
7.7
YY
ASYNCHRONOUS
COMPUTERS
............................................................................................
208
7.8
YY
DIY
DEVICE-A
SUPERVISOR
FOR
A
SUSPICIOUS
COMMERCIAL
DEVICE
..............................
211
YY
CONCLUSION
...............................................................................................................................
215
YY
REFERENCES
...............................................................................................................................
216
YY
INDEX
.........................................................................................................................................
220
YY
9
|
adam_txt |
TABLE
OF
CONTENTS
CHAPTER
1
YY
ALL
SECURITY
PROBLEMS
SOLVED
PERFECTLY
-
OR
PERHAPS
NOT?
.
10
1.1
YY
POPULAR
MISCONCEPTIONS
.
11
1.1.1
YY
(MIS)UNDERSTANDING
THE
BASIC
PRINCIPLES
OF
SECURITY
.
11
1.1.2
YY
WHY
DESIGN
SOMETHING
NEW?
.
12
1.1.3
YY
MOORE'S
LAW
AND
ITS
COROLLARY
ON
SECURITY
.
14
1.1.4
YY
ESPIONAGE
IN
THE
PAST
AND
PRESENT
.
14
1.2
YY
OMNIPRESENT,
UNRECOGNISED,
AND
UNADDRESSED
PROBLEMS
.
17
1.2.1
YY
LIABILITY
PROBLEM
.
17
1.2.2
YY
FAILURE
TO
RECOGNISE
IMPORTANT
PROBLEMS
TO
SOLVE
.
18
1.2.3
YY
BLACK
BOX
PROBLEM:
WHY
SHOULD
I
CARE
HOW
MY
SUPER-GIZMO
GETS
ITS
WORK
DONE?
.
22
1.2.4
YY
RELUCTANCE
TO
PROPERLY
ADDRESS
THE
"IMPOSSIBLE"
SCENARIOS
.
22
1.2.5
YY
THE
PROBLEMS
THAT
ELECTRONIC
ENGINEERS
CAN'T
SOLVE
.
24
1.3
YY
LOW
TECH
RULES
-
VERY
UNINTUITIVE
.
25
1.4
YY
MY
DESIGN
PHILOSOPHY
AND
APPROACH
TO
SECURITY
.
28
CHAPTER
2
YY
METHODS
OF
ATTACK
.
31
2.1
YY
METHODS
TO
COUNTERACT
.
31
2.2
YY
MATHEMATICAL
CRYPTO-ANALYSIS
.
32
2.2.1
YY
BRUTE-FORCE
.
34
2.2.2
YY
ATTACKS
ON
RNGS
.
36
2.3
YY
BUFFER-OVERFLOW
.
37
2.3.1
YY
TYPES
OF
BUFFER-OVERFLOW
ATTACKS
.
38
2.3.2
YY
VON
NEUMANN'S
VS.
HARVARD
ARCHITECTURE
.
39
2.4
YY
SIDE-CHANNEL
ATTACKS
.
40
2.4.1
YY
TEMPEST
-
A
TYPE
OF
SIDE-CHANNEL
.42
2.4.2
YY
HOW
TO
DEFEND
ON
A
DIY
BUDGET?
.49
2.5
YY
HARDWARE
TROJANS
.
54
2.5.1
YY
TYPES
OF
HARDWARE
TROJAN
.
55
2.5.2
YY
EAST
GERMAN
Z80
CLONE
VS.
THE
NEWEST
LONM
FPGA
.
56
2.5.3
YY
PLANTING,
DETECTING,
AND
COUNTERMEASURES
.
58
2.6
YY
EXPLOITING
INHERENTLY
INSECURE
PHYSICAL
PROPERTIES
.
61
2.6.1
YY
DELETING
HDD
AND
SSD
DEVICES
.
62
2.6.2
YY
RECOVERING
DATA
FROM
OLD
(E)EPROMS
.
63
YY
7
2.6.3
YY
SRAM
AND
DRAM
DATA
REMANENCE
.
68
2.6.4
YY
COLD
BOOT
ATTACKS
.
72
2.6.5
YY
WHAT
CAN
WE
DO
DIY?
.
74
CHAPTER
3
YY
RANDOM
NUMBER
GENERATORS
.
78
3.1
YY
A
GOOD
RNG
AS
A
NECESSARY
LINK
IN
THE
SECURITY
CHAIN
.
78
3.1.1
YY
DEFINING
SPECS
FOR
A
GOOD
RNG
FOR
USE
IN
A
CRYPTO
SYSTEM
.
78
3.1.2
YY
NIST
TESTING
.
79
3.1.3
YY
OTHER
WAYS
TO
USE
NIST
RNG
TESTS
FOR
SECURITY
EVALUATION
.
81
3.2
YY
TYPES
OF
RNGS
AVAILABLE
TODAY
AND
POSSIBLE
PROBLEMS
.
82
3.2.1
YY
PSEUDO-RANDOM
NUMBERS
GENERATORS
(PRNG)
.
82
3.2.2
YY
HIGHLY
INTEGRATED
TRNGS
.84
3.2.3
YY
BLACK-BOX
TRNGS
.
84
3.3
YY
ELEKTOR
TRNG
SOLVES
SOME
PROBLEMS,
BUT
.
85
CHAPTER
4
YY
CRYPTOGRAPHY
ON
PAPER,
COMPUTER,
AND
IN
THE
REAL
WORLD
.
90
4.1
YY
WHY
DO
CRYPTOSYSTEMS
FAIL?
.
90
4.1.1
YY
THE
FAMOUS
ENIGMA
.
90
4.1.2
YY
VENONA
AFFAIR
.
91
4.1.3
YY
MATHEMATICS
IS
PERFECT
-
WELL
ALMOST
.
94
4.1.4
YY
HUMANS
ARE
DEFINITELY
NOT
PERFECT
.
95
4.2
YY
MORE
PROBLEMS
AND
MORE
MISCONCEPTIONS
.
96
4.2.1
YY
LOOSE
DEFINITIONS
.
96
4.2.1.1
YY
LET'S
TRY
TO
DEFINE
ENCRYPTION
STRENGTH
.
98
4.2.1.2
YY
WHAT
IS
ENCRYPTION,
AND
WHAT
IS
NOT?
.
99
4.2.2
YY
SYMMETRIC
AND
ASYMMETRIC
ENCRYPTION
.
101
4.2.3
YY
PGP
AFFAIR
.
103
4.2.4
YY
QUANTUM
COMPUTERS
.
105
4.2.5
YY
REVERSING
AN
IMPLICATION
AND
T-COM
PAYPHONES
.
106
4.3
YY
BLACK-BOX
CRYPTOGRAPHY
.
110
4.3.1
YY
"CRYPTO
AG"
AFFAIRS
.
110
4.4
YY
ELEKTOR
OTP
CRYPTO
SHIELD
.
112
4.4.1
YY
KEY
DISTRIBUTION
PROBLEMS
.
117
4.5
YY
TAMPER-EVIDENT
BOX
SOLVES
SOME
PROBLEMS,
BUT
.
119
CHAPTER
5
YY
A
FEW
MORE
CHEAP
AND
HIGHLY
SECURE
GADGETS
.
124
5.1
YY
SD
CARD-TO-SD
CARD
COPIER
.
124
YY
8
5.2
YY
SD
CARD-TO-CASSETTE
TAPE
COPIER
.
126
5.3
YY
ZMC80
SYSTEM
BY
LEE
ALAN
HART
.
131
5.3.1
YY
CRYPTO
DEVELOPMENT
SHIELD
ADD-ON
.
135
5.3.2
YY
BUFFER-OVERFLOW
PROTECTION
ON
HARDWARE
LEVEL
.
138
5.3.3
YY
STACK
SMASHING
AND
CODE
OBFUSCATION
.
140
5.4
YY
MG-FLASH
ANALOGUE
MEMORY
FOR
TAMPER-EVIDENT
BOX
.
141
5.5
YY
SECURITY
BY
OBSCURITY
.
145
5.6
YY
MYNOR
CPU-LESS
COMPUTER
BY
DENNIS
KUSCHEL
.
146
CHAPTER
6
YY
HANDS-ON!
.
150
6.1
YY
TEMPEST
ATTACK
DEMOS
.
150
6.1.1
YY
TEMPEST
ON
A
DOT-MATRIX
PRINTER
.
150
6.1.2
YY
TEMPEST
ON
A
PS/2
OR
AN
USB
KEYBOARD
.
155
6.2
YY
BUFFER-OVERFLOW
ATTACK
DEMOS
.
158
6.2.1
YY
SMASHING
THE
STACK
ON
ZMC
Z80
.
162
6.2.2
YY
INJECTING
AND
EXECUTING
AN
ARBITRARY
CODE
.
164
6.3
YY
SRAM
BURNT-IN
DATA
RECOVERY
.
170
6.4
YY
COLD-BOOT
ATTACK
DEMO
.
178
CHAPTER
7
YY
A
FEW
MORE
IDEAS
TO
WORK
ON
.
182
7.1
YY
SIGSALY-2
"RELOADED"
.
182
7.2
YY
MICROWAVE
OVEN
-
AN
INNOCUOUS
MACHINE?
.
188
7.3
YY
"FUNCARD"
SYSTEM
FOR
SECURE
DIGITAL
SIGNING
AND
DECRYPTION
.
191
7.4
YY
TEMPEST-PROOF
TERMINAL
.
200
7.5
YY
FALSE
MORSE
SIGNATURE
GENERATOR
.
201
7.6
YY
ENCRYPTED
ROMS
.
205
7.7
YY
ASYNCHRONOUS
COMPUTERS
.
208
7.8
YY
DIY
DEVICE-A
SUPERVISOR
FOR
A
"SUSPICIOUS"
COMMERCIAL
DEVICE
.
211
YY
CONCLUSION
.
215
YY
REFERENCES
.
216
YY
INDEX
.
220
YY
9 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Matic, Luka 1976- |
author_GND | (DE-588)1267636629 |
author_facet | Matic, Luka 1976- |
author_role | aut |
author_sort | Matic, Luka 1976- |
author_variant | l m lm |
building | Verbundindex |
bvnumber | BV047558315 |
classification_rvk | ST 277 ZN 2800 ZN 4000 |
ctrlnum | (OCoLC)1277295451 (DE-599)DNB1243189916 |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | first published |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02634nam a22006618c 4500</leader><controlfield tag="001">BV047558315</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230516 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211025s2021 gw a||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">21,N42</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1243189916</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783895764653</subfield><subfield code="c">pbk: EUR 34.95 (DE) (freier Preis), EUR 36.00 (AT) (freier Preis), CHF 37.95 (freier Preis)</subfield><subfield code="9">978-3-89576-465-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3895764655</subfield><subfield code="9">3-89576-465-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783895764653</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Bestellnummer: 19903</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1277295451</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1243189916</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-NW</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 2800</subfield><subfield code="0">(DE-625)157280:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 4000</subfield><subfield code="0">(DE-625)157336:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Matic, Luka</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1267636629</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">A handbook on DIY electronic security and espionage</subfield><subfield code="c">Luka Matic</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">A handbook on Do it yourself electronic security and espionage</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">A handbook on Do-it-yourself electronic security and espionage</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">first published</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London, UK</subfield><subfield code="b">Elektor</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">229 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">23.5 cm x 17 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Elektor books</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis Seite 216-219</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Software</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Espionage</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Cryptosystem</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Technische Sicherheit</subfield><subfield code="0">(DE-588)4059233-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Elektor Verlag GmbH</subfield><subfield code="0">(DE-588)1065539746</subfield><subfield code="4">pbl</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-89576-466-0</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032933814&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032933814</subfield></datafield></record></collection> |
id | DE-604.BV047558315 |
illustrated | Illustrated |
index_date | 2024-07-03T18:26:39Z |
indexdate | 2024-07-10T09:14:38Z |
institution | BVB |
institution_GND | (DE-588)1065539746 |
isbn | 9783895764653 3895764655 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032933814 |
oclc_num | 1277295451 |
open_access_boolean | |
owner | DE-83 DE-29T DE-573 |
owner_facet | DE-83 DE-29T DE-573 |
physical | 229 Seiten Illustrationen, Diagramme 23.5 cm x 17 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Elektor |
record_format | marc |
series2 | Elektor books |
spelling | Matic, Luka 1976- Verfasser (DE-588)1267636629 aut A handbook on DIY electronic security and espionage Luka Matic A handbook on Do it yourself electronic security and espionage A handbook on Do-it-yourself electronic security and espionage first published London, UK Elektor 2021 229 Seiten Illustrationen, Diagramme 23.5 cm x 17 cm txt rdacontent n rdamedia nc rdacarrier Elektor books Literaturverzeichnis Seite 216-219 Technische Sicherheit (DE-588)4059233-9 gnd rswk-swf Hardware (DE-588)4023422-8 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Software Security Espionage Hardware Cryptosystem Computersicherheit (DE-588)4274324-2 s Technische Sicherheit (DE-588)4059233-9 s Hardware (DE-588)4023422-8 s Kryptologie (DE-588)4033329-2 s DE-604 Elektor Verlag GmbH (DE-588)1065539746 pbl Erscheint auch als Online-Ausgabe 978-3-89576-466-0 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032933814&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Matic, Luka 1976- A handbook on DIY electronic security and espionage Technische Sicherheit (DE-588)4059233-9 gnd Hardware (DE-588)4023422-8 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4059233-9 (DE-588)4023422-8 (DE-588)4033329-2 (DE-588)4274324-2 |
title | A handbook on DIY electronic security and espionage |
title_alt | A handbook on Do it yourself electronic security and espionage A handbook on Do-it-yourself electronic security and espionage |
title_auth | A handbook on DIY electronic security and espionage |
title_exact_search | A handbook on DIY electronic security and espionage |
title_exact_search_txtP | A handbook on DIY electronic security and espionage |
title_full | A handbook on DIY electronic security and espionage Luka Matic |
title_fullStr | A handbook on DIY electronic security and espionage Luka Matic |
title_full_unstemmed | A handbook on DIY electronic security and espionage Luka Matic |
title_short | A handbook on DIY electronic security and espionage |
title_sort | a handbook on diy electronic security and espionage |
topic | Technische Sicherheit (DE-588)4059233-9 gnd Hardware (DE-588)4023422-8 gnd Kryptologie (DE-588)4033329-2 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Technische Sicherheit Hardware Kryptologie Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032933814&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT maticluka ahandbookondiyelectronicsecurityandespionage AT elektorverlaggmbh ahandbookondiyelectronicsecurityandespionage AT maticluka ahandbookondoityourselfelectronicsecurityandespionage AT elektorverlaggmbh ahandbookondoityourselfelectronicsecurityandespionage |