eBooks-it.org Logo
eBooks-IT.org Inner Image

Cyber and Electromagnetic Threats in Modern Relay Protection

Cyber and Electromagnetic Threats in Modern Relay Protection Image

Book Details:

Publisher:CRC Press
Series: CRC Press , Modern
Author:Vladimir Gurevich
Edition:1
ISBN-10:1482264315
ISBN-13:9781482264319
Pages:222
Published:Dec 11 2014
Posted:May 29 2015
Language:English
Book format:PDF
Book size:29.77 MB

Book Description:

Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts, including cyber attacks and electromagnetic intrusions. From lightning strikes, electromagnetic fields generated by operating equipment, and issues with control cable shielding to modern technical tools that realize intentional destructive impacts remotely, this first-of-its-kind text covers the latest cyber and electromagnetic threats to digital protection relays. Emphasizing the importance of relay protection to the infrastructure of a country, this book: Explains how technological advances in the power industry, like the smart grid, can create dangerous vulnerabilities Discusses traditional passive means of protection, such as screened cabinets, filters, cables, special materials, and covers Describes advanced protective solutions based on hardware methods Cyber and Electromagnetic Threats in Modern Relay Protection is a valuable reference for engineers involved in the design, development, and use of relay protection. It is also beneficial for scientists, researchers, and students of vocational schools and technical universities.

Download Link:

Related Books:

Power Supply Devices and Systems of Relay Protection

Power Supply Devices and Systems of Relay Protection Image
Power Supply Devices and Systems of Relay Protection brings relay protection and electrical power engineers a single, concentrated source of information on auxiliary power supply systems and devices. The book also tackles specific problems and solutions of relay protection power supply systems and devices, which are often not dealt with in the literature. The author, an experienced engineer with more than 100 patents, draws on his own experience to offer practical, tested advice to readers. A Guide to Relay Protection Power Supply for Engineers and Technicians The first chapter reviews the electronics and primary elements of the system, including transistors, thyristors, optocouplers, logic elements, and relays, and their principles of operation. Thi...

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux and Mac Memory
The Art of Memory Forensics Image
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on ...

Cyber Warfare

How Conflicts in Cyberspace Are Challenging America and Changing the World
Cyber Warfare Image
The binary system of counting, which uses only 1s and 0s, lies at the heart of computational algorithms. Every number, every bit of data, every voice communication, and every video can, in essence, be expressed as a string of 1s and 0s. In physical terms, deep within the innards of the computer, silicon chips create those 1s and 0s through a series of switches whose structure is etched onto wafer-thin silicon integrated circuits. The beauty of cyberspace and its genius lies in recognizing the universal power of these simple 1s and 0s. The rapidity with which they can be manipulated has, over the past decades, increased exponentially. And that explosion in computing power has fostered a wild explosion of new technology. Hardly a day goes by without th...



2007 - 2021 © eBooks-IT.org