You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Are you fascinated by the complex web of electrical power that illuminates our modern world? Do you want to understand the intricate systems responsible for delivering electricity to our homes, businesses, and industries? Look no further than Electric Power Distribution System Engineering, Fourth Edition by renowned author Turan Gönen, revised and updated by Chee-Wooi Ten and Ali Mehrizi-Sani. This captivating book takes you on a journey through the fascinating realm of electric power distribution, offering a comprehensive yet accessible exploration of the engineering principles, technologies, and practices that underpin this vital aspect of our daily lives. Whether you're a curious non-spe...
Step into the captivating world of power systems with Modern Power System Analysis, Third Edition by acclaimed author Turan Gönen, and revised and updated by Chee-Wooi Ten and Yunhe Hou. This illuminating book offers a comprehensive examination of power system analysis. Whether you're a curious non-specialist, a voracious reader seeking knowledge, or a librarian or bookseller searching for a valuable resource, Gönen's masterpiece is sure to captivate you. This book is an excellent source to begin your journey. An in-depth understanding of the concepts and techniques involved in power system analysis is provided in this comprehensive guide. The book covers a wide range of topics, including ...
The Internet of Things (IoT) is a closed-loop system in which a set of sensors is connected to servers via a network. The data from sensors are stored in a database and then analysed by IoT analytics. The results are usually employed by either humans, machines, or software to make decisions about the operation of the system. This book provides an interface between the main disciplines of engineering/technology and the organizational, administrative, and planning capabilities of managing the IoT.
Cybersecurity has become a critical area to focus after recent hack attacks to key infrastructure and personal systems. This book reviews the building blocks of cybersecurity technologies and demonstrates the application of various technology intelligence methods through big data. Each chapter uses a different mining method to analyze these technologies through different kinds of data such as patents, tweets, publications, presentations, and other sources. It also analyzes cybersecurity methods in sectors such as manufacturing, energy and healthcare.
With over 140 countries fielding nation-state and rouge malious cyber hacking capabilities, it is critical that we are aware of threats and vulnerabilities. Adm. Michael Rogers, director of the National Security Agency warned Congress regarding cyber attacks, “It’s only a matter of the ‘when,’ not the ‘if,’ that we are going to see something dramatic.” Cyber Blackout is a warning. It is a chronicle of the cyber threats of which we find ourselves at risk every day. Our power supply is vulnerable. Our food supply. Even the basics of communication. Every facet of our national security is vulnerable to cyber threats, and we are not prepared to defend them all. Cyber Blackout explains how these threats have been building since the Cold War, how they affect us now, and how they are changing the concepts of war and peace as we know them. It is essential knowledge for anyone wishing to understand safety and security in the age of the fifth domain. www.cyberblackout.net
Artificial Intelligence Technology in Healthcare: Security and Privacy Issues focuses on current issues with patients’ privacy and data security including data breaches in healthcare organizations, unauthorized access to patients’ information, and medical identity theft. It explains recent breakthroughs and problems in deep learning security and privacy issues, emphasizing current state-of-the-art methods, methodologies, implementation, attacks, and countermeasures. It examines the issues related to developing artifiicial intelligence (AI)-based security mechanisms which can gather or share data across several healthcare applications securely and privately. Features: Combines multiple te...
In this era of 5G digital communication, the implementation of industry 4.0 is the need of the hour. The main aim of this industrial revolution is to completely automate the industry for better productivity, correct decision making and increased efficiency. All the concepts of industry 4.0 can only be implemented with the help of Cyber Physical System aka CPS. This is a smart system in which complete mechanism is monitored and controlled by computer-based algorithms. Confidentiality, Integrity and Availability are the three major concern for providing the add on security to any organization or a system. It has become a biggest challenge among the security professionals to secure these cyber ...
Comprehensive, cross-disciplinary coverage of Smart Grid issues from global expert researchers and practitioners. This definitive reference meets the need for a large scale, high quality work reference in Smart Grid engineering which is pivotal in the development of a low-carbon energy infrastructure. Including a total of 83 articles across 3 volumes The Smart Grid Handbook is organized in to 6 sections: Vision and Drivers, Transmission, Distribution, Smart Meters and Customers, Information and Communications Technology, and Socio-Economic Issues. Key features: Written by a team representing smart grid R&D, technology deployment, standards, industry practice, and socio-economic aspects. Visi...
This book presents a comprehensive reference source for dynamic and innovative research in the field of cyber security, focusing on nature-inspired research and applications. The authors present the design and development of future-ready cyber security measures, providing a critical and descriptive examination of all facets of cyber security with a special focus on recent technologies and applications. The book showcases the advanced defensive cyber security mechanism that is a requirement in the industry and highlights measures that provide efficient and fast solutions. The authors explore the potential of AI-based and nature-inspired based computing compatibilities in establishing an adaptive defense mechanism system. The book focuses on current research while highlighting the empirical results along with theoretical concepts to provide a reference for students, researchers, scholars, professionals, and practitioners in the field of cyber security and analytics. This book features contributions from leading scholars from all over the world.
Modern attacks routinely breach SCADA networks that are defended to IT standards. This is unacceptable. Defense in depth has failed us. In ""SCADA Security"" Ginter describes this failure and describes an alternative. Strong SCADA security is possible, practical, and cheaper than failed, IT-centric, defense-in-depth. While nothing can be completely secure, we decide how high to set the bar for our attackers. For important SCADA systems, effective attacks should always be ruinously expensive and difficult. We can and should defend our SCADA systems so thoroughly that even our most resourceful enemies tear their hair out and curse the names of our SCADA systems' designers.