Cyber and Electromagnetic Threats in Modern Relay Protection
Book Details:
Pages: | 222 |
Published: | Dec 11 2014 |
Posted: | May 29 2015 |
Language: | English |
Book format: | PDF |
Book size: | 29.77 MB |
Book Description:
Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts, including cyber attacks and electromagnetic intrusions. From lightning strikes, electromagnetic fields generated by operating equipment, and issues with control cable shielding to modern technical tools that realize intentional destructive impacts remotely, this first-of-its-kind text covers the latest cyber and electromagnetic threats to digital protection relays. Emphasizing the importance of relay protection to the infrastructure of a country, this book: Explains how technological advances in the power industry, like the smart grid, can create dangerous vulnerabilities Discusses traditional passive means of protection, such as screened cabinets, filters, cables, special materials, and covers Describes advanced protective solutions based on hardware methods Cyber and Electromagnetic Threats in Modern Relay Protection is a valuable reference for engineers involved in the design, development, and use of relay protection. It is also beneficial for scientists, researchers, and students of vocational schools and technical universities.
Power Supply Devices and Systems of Relay Protection brings relay protection and electrical power engineers a single, concentrated source of information on auxiliary power supply systems and devices. The book also tackles specific problems and solutions of relay protection power supply systems and devices, which are often not dealt with in the literature. The author, an experienced engineer with more than 100 patents, draws on his own experience to offer practical, tested advice to readers. A Guide to Relay Protection Power Supply for Engineers and Technicians The first chapter reviews the electronics and primary elements of the system, including transistors, thyristors, optocouplers, logic elements, and relays, and their principles of operation. Thi...
Detecting Malware and Threats in Windows, Linux and Mac Memory
Memory forensics provides cutting edge technology to help investigate digital attacks Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics-now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on ...
How Conflicts in Cyberspace Are Challenging America and Changing the World
The binary system of counting, which uses only 1s and 0s, lies at the heart of computational algorithms. Every number, every bit of data, every voice communication, and every video can, in essence, be expressed as a string of 1s and 0s. In physical terms, deep within the innards of the computer, silicon chips create those 1s and 0s through a series of switches whose structure is etched onto wafer-thin silicon integrated circuits. The beauty of cyberspace and its genius lies in recognizing the universal power of these simple 1s and 0s. The rapidity with which they can be manipulated has, over the past decades, increased exponentially. And that explosion in computing power has fostered a wild explosion of new technology. Hardly a day goes by without th...
2007 - 2021 © eBooks-IT.org