eBooks-it.org Logo
eBooks-IT.org Inner Image

Security and Privacy in Smart Grids

Security and Privacy in Smart Grids Image

Book Details:

Publisher:CRC Press
Series: CRC Press
Author:Yang Xiao
Edition:1
ISBN-10:1439877831
ISBN-13:9781439877838
Pages:353
Published:Jul 22 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:8.76 MB

Book Description:

Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports on the latest advances in the range of related areasmaking it an ideal reference for students, researchers, and engineers in these fields.The book explains grid security development and deployment and introduces novel approaches for securing todays smart grids. Supplying an overview of recommendations for a technical smart grid infrastructure, the book describes how to minimize power consumption and utility expenditure in data centers. It also: Details the challenges of cybersecurity for smart grid communication infrastructures Covers the regulations and standards relevant to smart grid security Explains how to conduct vulnerability assessments for substation automation systems Considers smart grid automation, SCADA system security, and smart grid security in the last mile The books chapters work together to provide you with a framework for implementing effective security through this growing system. Numerous figures, illustrations, graphs, and charts are included to aid in comprehension. With coverage that includes direct attacks, smart meters, and attacks via networks, this versatile reference presentsactionable suggestions you can put to use immediately to prevent such attacks.

Download Link:

Related Books:

Security and Privacy in Internet of Things

Models, Algorithms and Implementations
Security and Privacy in Internet of Things Image
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awar...

Computational Intelligence Applications in Smart Grids

Enabling Methodologies for Proactive and Self-Organizing Power Systems
Computational Intelligence Applications in Smart Grids Image
This book considers the emerging technologies and methodologies of the application of computational intelligence to smart grids. From a conceptual point of view, the smart grid is the convergence of information and operational technologies applied to the electric grid, allowing sustainable options to customers and improved levels of security. Smart grid technologies include advanced sensing systems, two-way high-speed communications, monitoring and enterprise analysis software, and related services used to obtain location-specific and real-time actionable data for the provision of enhanced services for both system operators (i.e. distribution automation, asset management, advanced metering infrastructure) and end-users (i.e. demand side management, d...

10 Don'ts on Your Digital Devices

The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices Image
In nontechnical language and engaging style, 10 Don'ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloudbased storage and mobile apps.It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and conv...



2007 - 2021 © eBooks-IT.org