REFERENCES
- Anderson , R. 2001 . Security Engineering: A Guide to Building Dependable Distributed Systems. , New York , NY : Wiley .
- Anonymous. (2007). “TEMPEST” retrieved May 12, 2007 from http://en.wikipedia.org/wiki/TEMPEST
- Interpol. (2003). IT security and crime prevention methods. Retrieved May 6, 2007 from http://www.interpol.int/Public/TechnologyCrime/CrimePrev/ITSecurity.asp
- Kuhn , M. G. 2003 . Compromising emanations: eavesdropping risks of computer displays. , Cambridge , MA : University of Cambridge . (Technical report based on unpublished Doctoral Dissertation)
- McConnell, J. M. (1992). National Security Telecommunications and Information Systems Security. Retrieved May 6, 2007 from http://www.cultural.com/web/security/infosec.glossary.html
- Pawliw, B. (2001). Tempest. Retrieved May 2, 2007 from http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci522583,00.html
- Pike, J. & Aftergood, S. (2000). TEMPEST. Retrieved May 2, 2007 from http://www.fas.org/irp/program/security/tempest.htm
- Rowe, N. C. (2006). Electronic Protection. U.S. Naval Postgraduate School. Retrieved May 6, 2007 from (Also in Rowe, N. C. (2006). The Handbook of Information Security, H. Bidgoli, (Ed.), (Ch. 77). New York: Wiley, 2006.) http://www.cs.nps.navy.mil/people/faculty/rowe/eprotect_final.htm
- Sherman, D. (2007). iPods can make pacemakers malfunction: study. Retrieved May 11, 2007, from http://www.reuters.com/article/technologyNews/idUSN1048845320070510
- United States, Air Force (2005a). Communications Security: Protected Distribution Systems. Retrieved May 11, 2007 http://www.docufarm.com/view.jsp?url=http%3A%2F%2Fwww.e-publishing.af.mil%2Fpubfiles%2Faf%2F33%2Fafi33-201v8%2Fafi33-201v8.pdf&q=emsec%2B%2522optical%2Bfiber%2522
- United States, Air Force. (2005b). Emissions Security Counter Measures Reviews. Retrieved May 2, 2007 from http://www.e-publishing.af.mil/pubfiles/af/33/afi33-203v3/afi33-203v3.pdf
- Wilson, G. R. (1995, March). Data Security by Design. Progressive Architecture. (pp. 82–84). Retrieved May 10, 2007 from http://cryptome.org/datasec.htm