Hardware-BasedComputerSecurityTechniquestoDefeatHackers.FromBiometricstoQuantumCryptography-RogerDube(Wiley,2008)