|
Showing 1 - 5 of
5 matches in All Departments
This book presents a holistic solution for Smart Grids that
includes the electricity: producers, electricity storages, grids,
market and customer plants. The authors have derived the
architectural paradigm for Smart Grids LINK from the signature of
their fractal structure. The presented LINK-based holistic
architecture enables the large-scale integration of distributed
energy resources by minimising the data to be exchanged, thus
considering privacy and cyber security by design. The
straightforwardness of LINK-Solution is related to its standardised
structures, enabling the coupling of energy and non-energy sectors
and Energy Communities. The Volt/var chain control as one of the
most challenging operation processes of Smart Grids is covered in
detail in this edition. Chapter by chapter, the reader is smoothly
introduced to this unique solution, facilitating its practical
implementation. This book is a valuable resource for experts,
consultants, engineers, scientists, and students in the Smart Grids
area and actors of the electricity market and politicians.
The first stop for your security needs when using Go, covering
host, network, and cloud security for ethical hackers and defense
against intrusion Key Features First introduction to Security with
Golang Adopting a Blue Team/Red Team approach Take advantage of
speed and inherent safety of Golang Works as an introduction to
security for Golang developers Works as a guide to Golang security
packages for recent Golang beginners Book DescriptionGo is becoming
more and more popular as a language for security experts. Its wide
use in server and cloud environments, its speed and ease of use,
and its evident capabilities for data analysis, have made it a
prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is
useful for both blue team and red team applications. With this
book, you will learn how to write secure software, monitor your
systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing,
and building secure web applications. Offensive topics include
brute force, port scanning, packet injection, web scraping, social
engineering, and post exploitation techniques. What you will learn
Learn the basic concepts and principles of secure programming Write
secure Golang programs and applications Understand classic patterns
of attack Write Golang scripts to defend against network-level
attacks Learn how to use Golang security packages Apply and explore
cryptographic methods and packages Learn the art of defending
against brute force attacks Secure web and cloud applications Who
this book is forSecurity with Go is aimed at developers with basics
in Go to the level that they can write their own scripts and small
programs without difficulty. Readers should be familiar with
security concepts, and familiarity with Python security
applications and libraries is an advantage, but not a necessity.
Un vecchio aedo e prossimo alla fine. Riflette sulla sua esistenza,
ripercorre le storie che ha raccontato. Durante la notte,
nell'attesa dell'alba e della morte, gli appaiono delle ombre.
Vogliono ancora una volta narrargli il mito di Ulisse. E un vecchio
cantore quello che parla, sta morendo e ormai confonde se stesso
con le storie che ha narrato per tanto tempo. Crede di essere
Telemaco e forse lo e ma neppure lui oramai sa dire se cio e vero.
Non sa neppure se quelle ombre che gli appaiono nella notte sono
veramente loro: Nestore, Penelope, Ulisse, Antinoo, Polifemo, Circe
e Calipso. Nel momento del passaggio tra vita e morte, verita e
storia si confondono. Forse e solo la morte che gli appare in tante
vesti o forse e la sua coscienza che prende quelle forme e si
impossessa di quei personaggi. Si svolge cosi un dialogo o forse un
monologo attendendo l'alba e la fine.
|
|