IEEE Recommended Practice for Monitoring Electric Power Quality

IEEE Recommended Practice for Monitoring Electric Power Quality

Author:

Publisher:

Published: 2009

Total Pages: 81

ISBN-13: 9780738159393

DOWNLOAD EBOOK

Abstract: This recommended practice encompasses the monitoring of electrical characteristics of single-phase and polyphase ac power systems. It includes consistent descriptions of conducted electromagnetic phenomena occurring on power systems. This recommended practice describes nominal conditions and deviations from these nominal conditions that may originate within the source of supply or load equipment or may originate from interactions between the source and the load. Also, this recommended practice discusses power quality monitoring devices, application techniques, and the interpretation of monitoring results. Keywords: assessment, compatibility, dip, distortion, electromagnetic phenomena, harmonics, imbalance, instruments, monitoring, power quality, rms variation, sag, swell, transient, unbalance.


Computer Security

Computer Security

Author: William Stallings

Publisher: Pearson Higher Ed

Published: 2012-02-28

Total Pages: 817

ISBN-13: 0133072630

DOWNLOAD EBOOK

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.


Cryptography and Network Security

Cryptography and Network Security

Author: William Stallings

Publisher: Pearson

Published: 2016-02-18

Total Pages: 772

ISBN-13: 0134484525

DOWNLOAD EBOOK

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. The Principles and Practice of Cryptography and Network Security Stallings’ Cryptography and Network Security, Seventh Edition, introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security. In the first part of the book, the basic issues to be addressed by a network security capability are explored by providing a tutorial and survey of cryptography and network security technology. The latter part of the book deals with the practice of network security: practical applications that have been implemented and are in use to provide network security. The Seventh Edition streamlines subject matter with new and updated material — including Sage, one of the most important features of the book. Sage is an open-source, multiplatform, freeware package that implements a very powerful, flexible, and easily learned mathematics and computer algebra system. It provides hands-on experience with cryptographic algorithms and supporting homework assignments. With Sage, the reader learns a powerful tool that can be used for virtually any mathematical application. The book also provides an unparalleled degree of support for the reader to ensure a successful learning experience.


Parasitic Diseases

Parasitic Diseases

Author: Dickson D. Despommier

Publisher: Springer Science & Business Media

Published: 2012-12-06

Total Pages: 346

ISBN-13: 1461224764

DOWNLOAD EBOOK

Worldwide, the numbers of people suffering and dying from parasitic diseases are overwhelming, with more than 100 million cases and 1 million deaths each year from malaria alone. Despite the magnitude of the problem and the importance of the parasites that cause opportunistic infections among persons with HIV/AIDS, medical schools in the United States, Canada, and other developed countries consistently reduce the amount of time spent on parasitic diseases in the curricu lum. As a result most medical students receive limited information about these diseases, and are inadequately prepared to diagnose or treat them as physicians. This problem is too large to be resolved within the time available for parasitology in the medical school curriculum; at most, students can be acquainted with the salient features of the medically important parasites. Likewise, the traditional isolation of parasitology from the rest of the curriculum (consistent with its exclu sion from most microbiology texts) is another unresolved problem. In my opinion, this is why most physicians are unable to think about the differential diagnosis of parasitic diseases in the same way that they routinely balance the probabilities of malignancy, cardiovascular, renal, and pulmonary disease vs other infectious diseases. To resolve these problems, relevant paradigms from parasitology must be used in the teaching of cell biology, molecular biology, genetics, and immu nology.


Best Software Practices for the Internet Age

Best Software Practices for the Internet Age

Author:

Publisher: Institute of Electrical & Electronics Engineers(IEEE)

Published: 1999

Total Pages: 284

ISBN-13:

DOWNLOAD EBOOK

The 42 papers, workshop and panel discussion reports, and tutorials describe efforts to improve standards that could benefit all users in industry, government, and academia. Among the main themes are national software engineering activities, systems, current standards, experience and use of standard


Accident Precursor Analysis and Management

Accident Precursor Analysis and Management

Author: National Academy of Engineering

Publisher: National Academies Press

Published: 2004-09-16

Total Pages: 221

ISBN-13: 0309092167

DOWNLOAD EBOOK

In the aftermath of catastrophes, it is common to find prior indicators, missed signals, and dismissed alerts that, had they been recognized and appropriately managed before the event, could have resulted in the undesired event being averted. These indicators are typically called "precursors." Accident Precursor Analysis and Management: Reducing Technological Risk Through Diligence documents various industrial and academic approaches to detecting, analyzing, and benefiting from accident precursors and examines public-sector and private-sector roles in the collection and use of precursor information. The book includes the analysis, findings and recommendations of the authoring NAE committee as well as eleven individually authored background papers on the opportunity of precursor analysis and management, risk assessment, risk management, and linking risk assessment and management.


Combinatorial Theory

Combinatorial Theory

Author: Marshall Hall

Publisher: John Wiley & Sons

Published: 1998-07-16

Total Pages: 464

ISBN-13: 9780471315186

DOWNLOAD EBOOK

Includes proof of van der Waerden's 1926 conjecture on permanents, Wilson's theorem on asymptotic existence, and other developments in combinatorics since 1967. Also covers coding theory and its important connection with designs, problems of enumeration, and partition. Presents fundamentals in addition to latest advances, with illustrative problems at the end of each chapter. Enlarged appendixes include a longer list of block designs.


Sea Ice Analysis and Forecasting

Sea Ice Analysis and Forecasting

Author: Tom Carrieres

Publisher: Cambridge University Press

Published: 2017-10-05

Total Pages: 263

ISBN-13: 1108417426

DOWNLOAD EBOOK

A comprehensive overview of the science involved in automated prediction of sea ice, for sea ice analysts, researchers, and professionals.


File System Forensic Analysis

File System Forensic Analysis

Author: Brian Carrier

Publisher: Addison-Wesley Professional

Published: 2005-03-17

Total Pages: 895

ISBN-13: 0134439546

DOWNLOAD EBOOK

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools—including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for "dead analysis" Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.


Engineering Education 4.0

Engineering Education 4.0

Author: Sulamith Frerich

Publisher: Springer

Published: 2017-04-12

Total Pages: 955

ISBN-13: 3319469169

DOWNLOAD EBOOK

This book presents a collection of results from the interdisciplinary research project “ELLI” published by researchers at RWTH Aachen University, the TU Dortmund and Ruhr-Universität Bochum between 2011 and 2016. All contributions showcase essential research results, concepts and innovative teaching methods to improve engineering education. Further, they focus on a variety of areas, including virtual and remote teaching and learning environments, student mobility, support throughout the student lifecycle, and the cultivation of interdisciplinary skills.