2[1]Van Eck Wim. Electromagnetic Radiation from Video Display Units: And Eavesdropping Risk?, Computers & Security vol 4, 1985
3[2]Markus G. Kuhn and Ross J. Anderson. Soft Tempest:Hidden Data Transmission Using Electromagnetic Emanations, University of Cambridge, David Aucsmith (Ed.): In-formation Hiding 1998
4[3]Cassi Goodman. An Introduction to TEMPEST,April, 2001
5[4]http://www.nsa.gov/sso/bao/tep.htm,TEMPEST Endorsement Program,Revised June 25, 2001
6[5]Mika St?hlberg. The TEMPEST Threat,Helsinki University of Technology, April, 2001
7[1]John M. Carroll. Computer Security. Butterworths, 1987
8[2]James A. Schwertzer. Computer, Business and Security. Butterworths, 1987
9[3]Lance J. Hoffman. Modern Methods for Computer and Privacy. Prentice Hall, 1992