9 Chapter 11Figure 11.3: Table lattice for a database with three attributes
10 Chapter 12Figure 12.1: Clay envelope and its content of tokens representing 7 jars of ...Figure 12.2: Architecture of SWIFTFigure 12.3: IBM method for generating bank card PINsFigure 12.4: Card fraud in the UK from 2004 to 2018Figure 12.5: A rigid wire is inserted through a hole in the Ingenico's conce...
11 Chapter 13Figure 13.1: A cutaway pin-tumbler lock (courtesy of Marc Weber Tobias)Figure 13.2: Key for a sidebar lockFigure 13.3: Sidebar bump key
12 Chapter 14Figure 14.1: A prepayment electricity meter (courtesy of Schlumberger)Figure 14.2: A tachograph chartFigure 14.3: A tachograph with an interruptor controlled by the driver using...Figure 14.4: One of the new formats for US postal meters (courtesy of Symbol...
13 Chapter 15Figure 15.1: Shared control using geometry
14 Chapter 16Figure 16.1: Scanning electron micrograph of paper (courtesy Ingenia Technol...Figure 16.2: A wristband seal from our local swimming pool
15 Chapter 17Figure 17.1: The prints in the McKie caseFigure 17.2: an iris with iris code (courtesy John Daugman)
16 Chapter 18Figure 18.1: The IBM 4758 cryptoprocessor (courtesy of Steve Weingart)Figure 18.2: The 4758 partially opened showing (from top left downward) the ...Figure 18.3: Our probing stationFigure 18.4: The data bus of an ST16 smartcard prepared for probing by excav...Figure 18.5: The protective mesh of an ST16 smartcard with a FIB cross for p...Figure 18.6: SX28 microcontroller with ‘glue logic’ (courtesy of Sergei Skor...
17 Chapter 19Figure 19.1: RF signal from a Toshiba laptop reconstructed several rooms awa...Figure 19.2: Normal textFigure 19.3: Text low-pass filteredFigure 19.4: Screen, normal textFigure 19.5: Screen, filtered textFigure 19.6: Page of normal textFigure 19.7: Page of filtered textFigure 19.8: Hz AM signalFigure 19.9: 1200 Hz AM signalFigure 19.10: Plot of the current measured during 256 single attempts to gue...
18 Chapter 21Figure 21.2: complex firewalls for an MLS network
19 Chapter 22Figure 22.1: GSM authentication system components
20 Chapter 23Figure 23.1: Spreading in DSSS (courtesy of Roche and Dugelay)Figure 23.2: Unspreading in DSSS (courtesy of Roche and Dugelay)
21 Chapter 24Figure 24.1: Cut-and-rotate scramblingFigure 24.2: Scrambled video frameFigure 24.3: Processed video frameFigure 24.4: The multiplexer generatorFigure 24.5: Binary revocation treeFigure 24.6: The Mosaic attack (courtesy Jet Photographic, www.jetphotograph
...
22 Chapter 27Figure 27.2: Hazard elimination in motor reversing circuitFigure 27.3: A threat treeFigure 27.4: The waterfall modelFigure 27.5: The spiral model
23 Chapter 28Figure 28.1: Two infusion pumps that are apparently of the same model (photo...
1 Cover
2 Table of Contents
3 Begin Reading
1 iii
2 xxxvii
3 xxxviii
4 xxxix
5 xli
6 xlii
7 xliii
8 xliv
9 xlv
10 xlvi
11 xlvii
12 xlviii
13 xlix
14 l
15 1
16 2
17 3
18 4
19 5
20 6
21 7
22 8
23 9
24 10
25 11
26 12
27 13
28 14
29 15
30 16
31 17
32 18
33 19
34 20
35 21
36 22
37 23
38 24
39 25
40 26
41 27
42 28
43 29
44 30
45 31
46 32
47 33
48 34
49 35
50 36
51 37
52 38
53 39
54 40
55 41
56 42
57 43
58 44
59 45
60 46
61 47
62 48
63 49
64 50
65 51
66 52
67 53
68 54
69 55
70 56
71 57
72 58
73 59
74 60
75 61
76 63
77 64
78 65
79 66
80 67
81 68
82 69
83 70
84 71
85 72
86 73
87 74
88 75
89 76
90 77
91 78
92 79
93 80
94 81
95 82
96 83
97 84
98 85
99 86
100 87
101 88
102 89
103 90
104 91
105 92
106 93
107 94
108 95
109 96
110 97
111 98
112 99
113 100
114 101
115 102
116 103
117 104
118 105
119 106
120 107
121 108
122 109
123 110
124 111
125 112
126 113
127 114
128 115
129 116
130 117
131 118
132 119
133 120
134 121
135 122
136 123
137 124
138 125
139 126
140 127
141 128
142 129
143 130
144 131
145 132
146 133
147 134
148 135
149 136
150 137
151 138
152 139
153 140
154 141
155 142
156 143
157 144
158 145
159 146
160 147
161 148
162 149
163 150
164 151
165 152
166 153
167 154
168 155
169 156
170 157
171 158
172 159
173 160
174 161
175 162
176 163
177 164
178 165
179 166
180 167
181 168
182 169
183 170
184 171
185 172
186 173
187 174
188 175
189 176
190 177
191 178
192 179
193 180
194 181
195 182
196 183
197 184
198 185
199 186
200 187
201 188
202 189
203 190
204 191
205 192
206 193
207 194
208 195
209 196
210 197
211 198
212 199
213 200
214 201
215 202
216 203
217 204
218 205
219 207
220 208
221 209
222 210
223 211
224 212
225 213
226 214
227 215
228 216
229 217
230 218
231 219
232 220
233 221
234 222
235 223
236 224
237 225
238 226
239 227
240 228
241 229
242 230
243 231
244 232
245 233
246 234
247 235
248 236
249 237
250 238
251 239
252 240
253 241
254 243
255 244
256 245
257 246
258 247
259 248
260 249
261 250
262 251
263 252
264 253
265 254
266 255
267 256
268 257
269 258
270 259
271 260
272 261
273 262
274 263
275 264
276 265
277 266
278 267
279 268
280 269
281 270
282 271
283 272
284 273
285 275
286 276
287 277
288 278
289 279
290 280
291 281
292 282
293 283
294 284
295 285
296 286
297 287
298 288
299 289
300 290
301 291
302 292
303 293
304 294
305 295
306 296
307 297
308 298
309 299
310 300
311 301
312 302
313 303
314 304
315 305
316 306
317 307
318 308
319 309
320 310
321 311
322 312
323 313
324 314
325 315
326 316
327 317
328 318
329 319
330 320
331 321
332 322
333 323
334 324
335 325
336 326
337 327
338 328
339 329
340 330
341 331
342 332
343 333
344 334
345 335
346 336
347 337
348 338
349 339
350 341
351 342
352 343
353 344
354 345
355 346
356 347
357 348
358 349
359 350
360 351
361 352
362 353
363 354
364 355
365 356
366 357
367 358
368 359
369 360
370 361
371 362
Читать дальше