In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.
Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
A thoroughly revised and updated edition of the essential guide to preserving your personal security
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business.
J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.
There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security.
Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on:
- The dangers from Facebook, smartphones, and facial recognition
- How to locate a nominee (or proxy) you can trust
- The art of pretexting, aka social engineering
- Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands
- The secrets of international privacy, and much more!
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
* Acquire essential practical knowledge of motors and drives, with a minimum of math and theory
* Updated material on the latest and most widely-used modern motors and drives
* New edition includes additional diagrams and worked examples throughout
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.
But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.
Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:Lingo--Common security terms defined so that you’re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work
This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)
She writes, ÒContent platforms and social media networks do not have the power to restrain stalkers, end intimate partner violence, eliminate child abuse, or stop street harassment. But they can cultivate better interactions and better discourse, through thoughtful architecture, active moderation and community management.Ó
So how do we filter content from garbage? Read on.
Sarah Jeong writes about technology, policy and law with bylines at Forbes, The Verge, The Guardian, Slate and WIRED.
Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Payton and Claypoole skillfully introduce readers to the many ways we are “watched” and how to change behaviors and activities to recapture and regain more of our privacy. The authors suggest remedies from tools, to behavior changes, to speaking out to politicians to request their privacy back. Anyone who uses digital devices for any reason will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Key Features: • Impacts of new regulation • Simple and clear explanations of generation, transmission and governance • How cleaner fuels and new technology are transforming the industry • The newest environmental standards
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
COVERS ALL SIX EXAM DOMAINS:
Legal and ethical principles
Hybrid and emerging technologies
ELECTRONIC CONTENT INCLUDES:250 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain
Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:
The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their preyHow social networking, cloud computing, and other popular trends help or hurt our online securityHow metrics, requirements gathering, design, and law can take security to a higher levelThe real, little-publicized history of PGP
This book includes contributions from:
Peiter "Mudge" ZatkoJim StickleyElizabeth NicholsChenxi WangEd BellisBen EdelmanPhil Zimmermann and Jon CallasKathy WangMark CurpheyJohn McManusJames RouthRandy V. SabettAnton ChuvakinGrant Geyer and Brian DunphyPeter WaynerMichael Wood and Fernando Francisco
All royalties will be donated to the Internet Engineering Task Force (IETF).
In the ever-evolving field of protective relay technology, an engineer’s personal preference and professional judgment are as important to power system protection as the physical relays used to detect and isolate abnormal conditions.
Invaluable Insights from an Experienced Expert
Protective Relay Principles focuses on probable power system failure modes and the important characteristics of the protective relays used to detect these postulated failures. The book presents useful new concepts in a way that is easier to understand because they are equally relevant to older, electromechanical and solid-state relays, and newer, more versatile microprocessor-based relays. It introduces the applications, considerations, and setting philosophies used in transmission-line, distribution-line, and substation applications, covering concepts associated with general system operations and fault detection. Topics include relay load limits, cold load pickup, voltage recovery, and arc flash. The author also delves into the philosophies that engineers employ in both urban and rural areas, with a detailed consideration of setpoint function.
Analysis of Key Concepts That Are Usually Just Glossed Over
This versatile text is ideal for new engineers to use as a tutorial before they open the instruction manuals that accompany multi-function microprocessor-based relays. Guiding readers through the transient loading conditions that can result in relay misoperation, the author elaborates on concepts that are not generally discussed, but can be very helpful in specific applications. Readers will come away with an excellent grasp of important design considerations for working with overcurrent, over- and undervoltage, impedance, distance, and differential type relay functions, either individually or in combination. Also useful for students as a textbook, this book includes practical examples for many applications, and offers guidance for more unusual ones.
An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.
Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.
This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.Third edition of the seminal work on Google hackingGoogle hacking continues to be a critical phase of reconnaissance in penetration testing and Open Source Intelligence (OSINT)Features cool new hacks such as finding reports generated by security scanners and back-up files, finding sensitive info in WordPress and SSH configuration, and all new chapters on scripting Google hacks for better searches as well as using Google hacking with other search engines and APIs
This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
The first half of the book focuses on water chillers and the second half addresses cooling towers. In both sections, the author includes the following material:
Fundamentals—basic information about systems and equipment, including how they and their various components work Design and Application—equipment sizing, selection, and application; details of piping, control, and water treatment; and special considerations such as noise control, electrical service, fire protection, and energy efficiency Operations and Maintenance—commissioning and programmed maintenance of components and systems, with guidelines and recommended specifications for procurement
This up-to-date book provides HVAC designers, building owners, operating and maintenance staff, architects, and mechanical contractors with definitive and practical guidance on the application, design, purchase, operation, and maintenance of water chillers and cooling towers. It offers helpful information for you to use on a daily basis, including checklists and troubleshooting guidelines.
Getting Online. Readers will have all the information they need to decide what kind of broadband connection works best for them, which browser they should use, and what kind of spyware-fighting and virus-and spam-protection measures they need to protect themselves.Finding Information. Google may be the leading search site, but it's certainly not the only game in town. This book introduces a diverse and useful collection of sites that help uncover everything from health care information, to shopping, travel and finance, to dependable reviews and ratings.Movies, music, and photos. The Web's teeming with entertainment--and not just the sort of postage-stamp sized videos that only a geek could love. Learn where to download movies, watch TV online, listen to music, play games, and post and share photos with friends.Keeping in touch. Email's only the beginning. This book introduces readers to the many tools that make the modern Internet such a great way to stay connected. From Web-based discussion groups to instant messaging programs, and from blogs and podcasts to Internet-based phone calls, this book will help you join the conversation.
This utterly current book covers:
Ideal for anyone just venturing into cyberspace, this book is also perfect for more experienced users who could use an update to today's most exciting internet applications.
*Marty Brown, author and power supply design consultant, has personally selected all content for its relevance and usefulness
*Covers best design practices for switching power supplies and power converters
*Emphasis is on pragmatic solutions to commonly encountered design problems and tasks
Topics covered in the handbook include:Processes to enhance productionWell modification to maximize oil and gas recoveryCompletion and evaluation of wells, well testing, and well surveys
Reservoir Engineering Handbook, Fourth Edition provides solid information and insight for engineers and students alike on maximizing production from a field in order to obtain the best possible economic return. With this handbook, professionals will find a valuable reference for understanding the key relationships among the different operating variables. Examples contained in this reference demonstrate the performance of processes under forceful conditions through a wide variety of applications.
• Fundamental for the advancement of reservoir engineering concepts
• Step-by-step field performance calculations
• Easy to understand analysis of oil recovery mechanisms
• Step-by-step analysis of oil recovery mechanisms
• New chapter on fractured reservoirs
Thoroughly revised throughout, Linden's Handbook of Batteries, Fourth Editions provides authoritative coverage of the characteristics, properties, and performance of every major battery type. New information on emerging battery systems and their applications is included in this definitive volume. International experts offer unparalleled technical guidance on using leading-edge technologies, materials, and methods in new designs and products, and selecting the most suitable battery for a particular application. All of the in-depth data you need is contained in this comprehensive resource. The book will be useful to graduate students, battery researchers, applications engineers, and all others interested in the state-of-the-art in battery technology.
Linden's Handbook of Batteries, Fourth Edition covers:PRINCIPLES OF OPERATION PRIMARY AND SECONDARY BATTERIES SPECIALIZED BATTERY SYSTEMS FUEL CELLS AND ELECTROCHEMICAL CAPACITORS
Includes new chapters on:Battery modeling Battery electrolytes Lithium-ion batteries Battery selection for consumer electronics Batteries for electric, hybrid, and plug-in hybrid vehicles Batteries for electrical energy storage systems Batteries for biomedical applications Button cell batteries Batteries for military and space applications, including reserve water-activated and reserve military batteries Electrochemical capacitors
In addition to gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, students will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive unlimited access to the author's accompanying website, which contains simulated cases that integrate many of the topics covered in the text.
This text is required reading for anyone involved in computer investigations or computer administration, including computer forensic consultants, law enforcement, computer security professionals, government agencies (IRS, FBI, CIA, Dept. of Justice), fraud examiners, system administrators, and lawyers.Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidenceOffers readers information about relevant legal issuesFeatures coverage of the abuse of computer networks and privacy and security issues on computer networks
Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.Describes mathematical tools for solving cybersecurity problems, enabling analysts to pick the most optimal tool for the task at handContains numerous cybersecurity examples and exercises using real world dataWritten by mathematicians and statisticians with hands-on practitioner experience
You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
Learn how "inside out" techniques can poke holes into protected networksUnderstand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate dataRecognize weaknesses in today's powerful cloud infrastructures and how they can be exploitedPrevent attacks against the mobile workforce and their devices containing valuable dataBe aware of attacks via social networking sites to obtain confidential information from executives and their assistantsGet case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
The Nuclear Engineering Handbook is a response to this global resurgence of interest in commercial nuclear power. A broad overview of nuclear power and engineering and their limitless potential, this basic introduction to the field provides an in-depth discussion of power plants and extensive coverage of the nuclear fuel cycle, waste disposal, and related engineering technologies.
Organized into three sections—Nuclear Power Reactors, Nuclear Fuel Cycle Processes and Facilities, and Engineering and Analytical Applications—this book addresses the entire nuclear fuel cycle and process. Topics include everything from the mining, milling, and enrichment of uranium and thorium fuel resources, to fuel fabrication, nuclear materials transportation, fuel reprocessing, and safe waste disposal. This all-encompassing volume discusses current analytical techniques related to nuclear engineering, addressing safety, heat transfer, shielding, thermo-hydraulics, and heat physics. Covering reactor operation and radiation protection, it also outlines the economic considerations involved in building new nuclear power stations instead of large fossil-fueled plants, and elaborates on concerns regarding the control of emissions from the latter.
A review of past and current nuclear engineering capabilities, this valuable resource covers the gamut of crucial topics, including historical perspectives, a detailed technological review, and an assessment of the field’s future direction. It is an exceptional tool that will help readers to foster optimal understanding and use of nuclear power for electricity generation now and in the future.
Electrical Insulation for Rotating Machines: Design, Evaluation, Aging, Testing, and Repair, Second Edition covers all aspects in the design, deterioration, testing, and repair of the electrical insulation used in motors and generators of all ratings greater than fractional horsepower size. It discusses both rotor and stator windings; gives a historical overview of machine insulation design; and describes the materials and manufacturing methods of the rotor and stator winding insulation systems in current use (while covering systems made over fifty years ago). It covers how to select the insulation systems for use in new machines, and explains over thirty different rotor and stator winding failure processes, including the methods to repair, or least slow down, each process. Finally, it reviews the theoretical basis, practical application, and interpretation of forty different tests and monitors that are used to assess winding insulation condition, thereby helping machine users avoid unnecessary machine failures and reduce maintenance costs.
Electrical Insulation for Rotating Machines:Documents the large array of machine electrical failure mechanisms, repair methods, and test techniques that are currently available Educates owners of machines as well as repair shops on the different failure processes and shows them how to fix or otherwise ameliorate them Offers chapters on testing, monitoring, and maintenance strategies that assist in educating machine users and repair shops on the tests needed for specific situations and how to minimize motor and generator maintenance costs Captures the state of both the present and past “art” in rotating machine insulation system design and manufacture, which helps designers learn from the knowledge acquired by previous generations
An ideal read for researchers, developers, and manufacturers of electrical insulating materials for machines, Electrical Insulation for Rotating Machines will also benefit designers of motors and generators who must select and apply electrical insulation in machines.
This doc covers the basics of anonymity, hactivism, & some of the hidden parts of the Internet underground.
Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden service) is and what kind of things you may find. It is not an invitation to break the law without recourse. Just like any network, this one has both good and bad guys. If you break the law, you will get caught. Bad guys have to be lucky EVERY time. The Good guys only have to be lucky once.
Written by prominent experts in the field, this book takes an in-depth look at the issues of electrical insulators for icing and polluted environments. It shows:
Engineers and environmental specialists how to carry out appropriate insulator contamination measurements, understand how these readings change with time and weather, and work out how the readings compare with the upper limits set by insulator dimensions in their existing stations
Design engineers how to assess the likely maximum pollution and icing limits at a substation or along an overhead line, and then select insulators that have appropriate withstand margins
Regulators why modest ice accretion at a moderate 0oC temperature on one occasion can qualify as a major reliability event day, while many similar days pass each winter without power system problems
Educators why the ice surface flashover is well behaved compared to the conventional pollution flashover, making it much more suitable for demonstrations, modeling, and analysis
The book is complemented with case studies and design equations to help readers identify the most appropriate insulators, bushings, and maintenance plans for their local conditions. Additionally, readers may download supplemental materials supporting evaluation of local climate and contamination.
Insulators for Icing and Polluted Environments is indispensable reading for any professional who needs reliable electrical supply from networks exposed to sources of wetting and pollution. It also serves as an excellent introduction to the subjects of high-voltage surface flashover, environmental electrochemistry, and insulation coordination for researchers, professors, and students.
Proven as a useful in-depth resource and comprehensive reference for modern automotive systems engineers, students, and researchers, this book speaks from the perspective of the overall drive train system and not just its individual components.
New to the second edition:
A case study appendix that breaks down the Toyota Prius hybrid system Corrections and updates of the material in the first edition Three new chapters on drive train design methodology and control principles A completely rewritten chapter on Fundamentals of Regenerative Braking
Employing sufficient mathematical rigor, the authors comprehensively cover vehicle performance characteristics, EV and HEV configurations, control strategies, modeling, and simulations for modern vehicles.
They also cover topics including:
Drive train architecture analysis and design methodologies Internal Combustion Engine (ICE)-based drive trains Electric propulsion systems Energy storage systems Regenerative braking Fuel cell applications in vehicles Hybrid-electric drive train design
The first edition of this book gave practicing engineers and students a systematic reference to fully understand the essentials of this new technology. This edition introduces newer topics and offers deeper treatments than those included in the first. Revised many times over many years, it will greatly aid engineers, students, researchers, and other professionals who are working in automotive-related industries, as well as those in government and academia.
Provides Basic Transferable Skills for Managing Electrical Power on Ships or on Land
This groundbreaking book is the first volume of its kind to illustrate optimization of all aspects of shipboard electrical power systems. Applying author Mukund Patel’s rare combination of industrial and educational work experiences and insight, it offers solutions to meet the increasing demand for large, fast, efficient, and reconfigurable ships to compete in international markets.
For 30 years, Professor Patel was an engineer for companies including General Electric, Lockheed Martin, and Westinghouse Electric, and in the past 15 years he has been an engineering professor at the U.S. Merchant Marine Academy. That varied experience helped him zero in on the specialized multidimensional knowledge an engineer requires—and that is what sets his book apart.
Compiles Critical, Hard-to-Find Information on Power System Design, Analysis, and Operation
The global shortage of power engineers is not deterring countries from heavily investing in construction of new power plants and grids. Consequent growth in university electrical power programs is satisfying the demand for engineers, but novice graduates require accelerated understanding and practical experience before entering the thriving maritime segment.
Ideal for readers with limited electrical experience, wide-ranging coverage includes power system basics, power generation, electrical machines, power distribution, batteries, and marine industry standards. This book is an invaluable tool for engineers working on ships, as well as in ports, industrial power plants, refineries, and other similar environments.
Ideal for software engineers new to privacy, this book helps you examine privacy-protective information management architectures and their foundational components—building blocks that you can combine in many ways. Policymakers, academics, students, and advocates unfamiliar with the technical terrain will learn how these tools can help drive policies to maximize privacy protection.Restrict access to data through a variety of application-level controlsUse security architectures to avoid creating a single point of trust in your systemsExplore federated architectures that let users retrieve and view data without compromising data securityMaintain and analyze audit logs as part of comprehensive system oversightExamine case studies to learn how these building blocks help solve real problemsUnderstand the role and responsibilities of a Privacy Engineer for maintaining your privacy architecture
- Describes boiler theory
- Elaborates on the parts and sub-assemblies of the boiler and its essential auxiliaries
- Explains firing systems, including FBC and HRSG
Insights from a Professional with Decades of Experience
Take advantage of the author’s rare techno-commercial perspective and decades of hands-on international experience with industrial and utility boiler systems. Boilers for Power and Process builds on fundamentals – heat transfer, fluid flow, combustion, and fuels – using hundreds of illustrations and tables, a glossary of key terms, and appendices outlining essential calculations required for common processes.
Ruthless Optimization Leads to Evolution
Examining the latest breakthroughs in boiler technology, this reference details the evolution and what the author calls “ruthless” optimization of firing systems and boilers in the last 150 years. It explains why only the most fuel-flexible, dynamically responsive, best-constructed boilers are used today. This company-neutral text discusses competing designs and why different systems are particularly useful and cost-effective for certain business sectors and global regions.
Succinct and easy to navigate, this text illustrates the practical business value and applications of different boilers, distilling the essential information, creating a must-have reference for an intimate understanding of boiler technology.
Nearly all the chapters were written by professionals in the respective fields. That makes this book an especially valuable and reliable source of information. The second edition is extended by several new chapters such as tidal power stations, the Desertec project, thermography of buildings and more. Furthermore, the critical debate about current first generation bio-fuels is carefully reflected, and the book presents promising solutions that do not trade in food for fuel.
The editors are experienced journalists and illustrate the text with simple diagrams and information boxes, printed in full-color throughout.
A valuable resource for applied physicists, engineers in power technology, engineers, and anyone interested in natural sciences.
COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM DOMAINS:
Secure software concepts
Secure software requirements
Secure software design
Secure software implementation/coding
Secure software testing
Software deployment, operations, maintenance, and disposal
Supply chain and software acquisitions
ELECTRONIC CONTENT INCLUDES:TWO PRACTICE EXAMS
Power System SCADA and Smart Gridsbrings together in one concise volume the fundamentals and possible application functions of power system supervisory control and data acquisition (SCADA). The text begins by providing an overview of SCADA systems, evolution, and use in power systems and the data acquisition process. It then describes the components of SCADA systems, from the legacy remote terminal units (RTUs) to the latest intelligent electronic devices (IEDs), data concentrators, and master stations, as well as: Examines the building and practical implementation of different SCADA systems Offers a comprehensive discussion of the data communication, protocols, and media usage Covers substation automation (SA), which forms the basis for transmission, distribution, and customer automation Addresses distribution automation and distribution management systems (DA/DMS) and energy management systems (EMS) for transmission control centers Discusses smart distribution, smart transmission, and smart grid solutions such as smart homes with home energy management systems (HEMs), plugged hybrid electric vehicles, and more
Power System SCADA and Smart Grids is designed to assist electrical engineering students, researchers, and practitioners alike in acquiring a solid understanding of SCADA systems and application functions in generation, transmission, and distribution systems, which are evolving day by day, to help them adapt to new challenges effortlessly. The book reveals the inner secrets of SCADA systems, unveils the potential of the smart grid, and inspires more minds to get involved in the development process.
This must-have second edition includes up-to-date data, diagrams, illustrations and thorough new material on:the fundamentals of wind turbine aerodynamics; wind turbine testing and modelling; wind turbine design standards; offshore wind energy; special purpose applications, such as energy storage and fuel production.
Fifty additional homework problems and a new appendix on data processing make this comprehensive edition perfect for engineering students.
This book offers a complete examination of one of the most promising sources of renewable energy and is a great introduction to this cross-disciplinary field for practising engineers.
“provides a wealth of information and is an excellent reference book for people interested in the subject of wind energy.” (IEEE Power & Energy Magazine, November/December 2003)
“deserves a place in the library of every university and college where renewable energy is taught.” (The International Journal of Electrical Engineering Education, Vol.41, No.2 April 2004)
“a very comprehensive and well-organized treatment of the current status of wind power.” (Choice, Vol. 40, No. 4, December 2002)