Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Ce travail propose d'optimiser le coût de la surveillance du réseau électrique en installant des PMU aux endroits les plus optimaux en fonction de diverses contraintes de réseau. le travail effectué est d'abord testé sur le système de bus IEEE 14, 30 et 118, puis sur le réseau nord-est du réseau électrique indien. la programmation linéaire en nombres entiers est utilisée comme outil d'optimisation. ce travail traite également de la capacité de canal restreinte et fournit les endroits les plus optimaux pour le placement des PMU.
Questo lavoro fornisce l'idea di ottimizzare il costo del monitoraggio della rete elettrica installando le PMU nelle posizioni più ottimali in base a vari vincoli di rete. Il lavoro svolto è stato testato prima sul sistema IEEE a 14, 30 e 118 bus e poi sulla rete del nord-est della rete elettrica indiana. La programmazione lineare intera è utilizzata come strumento di ottimizzazione.
V dannoj rabote predstawlena ideq optimizacii zatrat na monitoring seti änergosistemy putem ustanowki PMU w naibolee optimal'nyh mestah s uchetom razlichnyh setewyh ogranichenij. Prowedennaq rabota snachala testiruetsq na sisteme shin IEEE 14, 30, 118, a zatem na sewero-wostochnoj seti indijskoj änergosistemy. V kachestwe instrumenta optimizacii ispol'zuetsq celochislennoe linejnoe programmirowanie. V rabote takzhe rassmatriwaetsq ogranichennaq propusknaq sposobnost' kanala i predlagaütsq naibolee optimal'nye mesta dlq razmescheniq PMU.
In dieser Arbeit wird eine Idee zur Optimierung der Kosten für die Überwachung des Stromnetzes durch die Installation von PMUs an den optimalsten Standorten unter Berücksichtigung verschiedener Netzbeschränkungen vorgestellt. Die durchgeführte Arbeit wird zunächst am IEEE 14, 30 und 118 Bus-System getestet, gefolgt vom nordöstlichen Netz des indischen Stromnetzes.
Este trabalho dá a ideia de otimizar o custo da monitorização da rede do sistema de energia através da instalação de PMU nas localizações mais óptimas, sujeitas a várias restrições da rede. O trabalho realizado é testado primeiro no sistema de barramento IEEE 14, 30 e 118, seguido da rede do nordeste da rede eléctrica indiana.
DESCRIPTIONCloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment.WHAT WILL YOU LEARN ¿ Understand the critical role of Identity and Access Management (IAM) in cloud environments.¿ Address different types of security vulnerabilities in the cloud.¿ Develop and apply effective incident response strategies for detecting, responding to, and recovering from security incidents.¿ Establish a robust and secure security system by selecting appropriate security solutions for your cloud ecosystem.TABLE OF CONTENTS SECTION I: Overview and Need to Transform to Cloud Landscape1. Evolution of Cloud Computing and its Impact on Security 2. Understanding the Core Principles of Cloud Security and its Importance3. Cloud Landscape Assessment and Choosing the Solution for Your EnterpriseSECTION II: Building Blocks of Cloud Security Framework and Adoption Path4. Cloud Security Architecture and Implementation Framework5. Native Cloud Security Controls and Building Blocks6. Examine Regulatory Compliance and Adoption path for Cloud 7. Creating and Enforcing Effective Security PoliciesSECTION III: Maturity Path8. Leveraging Cloud-based Security Solutions for Security-as-a-Service9. Cloud Security Recommendations and Best Practices
Security is a shared responsibility, and we must all own itKey FeaturesExpert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.DescriptionOnce a business is connected to the Internet, it is vulnerable to cyberattacks, threats, and vulnerabilities. These vulnerabilities now take several forms, including Phishing, Trojans, Botnets, Ransomware, Distributed Denial of Service (DDoS), Wiper Attacks, Intellectual Property thefts, and others.This book will help and guide the readers through the process of creating and integrating a secure cyber ecosystem into their digital business operations. In addition, it will help readers safeguard and defend the IT security infrastructure by implementing the numerous tried-and-tested procedures outlined in this book.The tactics covered in this book provide a moderate introduction to defensive and offensive strategies, and they are supported by recent and popular use-cases on cyberattacks. The book provides a well-illustrated introduction to a set of methods for protecting the system from vulnerabilities and expert-led measures for initiating various urgent steps after an attack has been detected.What you will learnAdopt MITRE ATT&CK and MITRE framework and examine NIST, ITIL, and ISMS recommendations.Understand all forms of vulnerabilities, application security mechanisms, and deployment strategies.Know-how of Cloud Security Posture Management (CSPM), Threat Intelligence, and modern SIEM systems.Learn security gap analysis, Cybersecurity planning, and strategy monitoring.Who this book is forProfessionals in IT security, Cybersecurity, and other related fields working to improve the organization''s overall security will find this book a valuable resource and companion.This book will guide young professionals who are planning to enter Cybersecurity with the right set of skills and knowledge.Table of ContentsSection - I: Overview and Need for Cybersecurity1. Overview of Information Security and Cybersecurity2. Aligning Security with Business Objectives and Defining CISO RoleSection - II: Building Blocks for a Secured Ecosystem and Identification of Critical Components3. Next-generation Perimeter Solutions4. Next-generation Endpoint Security5. Security Incident Response (IR) Methodology6. Cloud Security & Identity Management7. Vulnerability Management and Application Security8. Critical Infrastructure Component of Cloud and Data ClassificationSection - III: Assurance Framework (the RUN Mode) and Adoption of Regulatory Standards9. Importance of Regulatory Requirements and Business Continuity10. Risk management- Life Cycle11. People, Process, and Awareness12. Threat Intelligence & Next-generation SIEM Solution13. Cloud Security Posture Management (CSPM)Section - IV: Cybersecurity Strategy Guidelines, Templates, and Recommendations14. Implementation of Guidelines & Templates15. Best Practices and RecommendationsRead more
This book provides insights into contemporary issues and challenges in Multi-Criteria decision Models. It is a useful guide for identifying, understanding and categorizing Multi-Criteria Decision Models, and ultimately implementing the analysis for effective decision-making.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.