loading
IEEE CONTROL HDBK - THE CONTROL HANDBOOK
IEEE
A description is not available for this item.
API SECURITY - Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries
October 1, 2004 - API

INTRODUCTION TO SECURITY VULNERABILITY ASSESSMENT The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Assessment (SVA). The SVA is a systematic process...

ISA CONTROL SYSTEMS ENGIN - Control Systems Engineering (CSE) Study Guide
January 1, 2012 - ISA

This downloadable fifth edition is for use by individuals preparing for the Control Systems Professional Engineer (CSPE) examination. This update includes the latest examination specification that goes into effect with the October 2011 offering. The manual provides candidates for the...

ISA CONTROL SYSTEMS SAFET - Control Systems Safety Evaluation and Reliability
January 1, 2010 - ISA

This book is intended to serve a wide variety of users. This updated third edition provides the detailed background necessary to understand how to meet important new safety regulations and reliability engineering topics. Professional control system designers will learn to properly evaluate...

ISA CONTROL VALVE PRIMER: - Control Valve Primer: A User's Guide
January 1, 2009 - ISA

Includes insights on valve sizing, smart (digital) valve positioners, field-based architecture, network system technology, and control loop performance evaluation. Hans Baumann, a holder of more than 150 patents, and author of over a hundred publications in control valve technology,...

API SECURITY GUIDELINES - Security Guidelines for the Petroleum Industry
April 1, 2005 - API

Scope and Objective The objective of this document is to provide general guidance to owners and operators of U.S. domestic petroleum assets for effectively managing security risks and provide a reference of certain applicable Federal security laws and regulations that may impact...

DS/EN IEC 60839-11-5 - Alarm and electronic security systems – Part 11-5: Electronic access control systems – Open Supervised Device Protocol (OSDP)
September 21, 2020 - DS

IEC 60839-11-5:2020 specifies the Open supervised device protocol (OSDP) for electronic access control systems. This includes communication settings, commands and replies between the ACU and the peripheral devices. It also includes a mapping of mandatory and optional requirements as...

CONTROL SYSTEMS DOCUMENTA - Control Systems Documentation: Applying Symbols and Identification
January 1, 2004 - ISA

This ISA classic provides the symbols and identification commonly used throughout the process industries. It contains sample P&ID and numerous examples of symbols and tagging concepts. It also provides most of the symbols and identifiers that are unique to instrumentation and gives practical...

Mastering Windows Security and Hardening
July 8, 2020 - PACKT

Enhance Windows security and protect your systems and servers from various cyber attacks Key Features * Protect your device using a zero-trust approach and advanced security techniques * Implement efficient security measures using Microsoft Intune, Configuration Manager, and...

IEC 60839-11-5 - ALARM AND ELECTRONIC SECURITY SYSTEMS - PART 11-5: ELECTRONIC ACCESS CONTROL SYSTEMS - OPEN SUPERVISED DEVICE PROTOCOL (OSDP)
July 1, 2020 - IEC

This part of IEC 60839 specifies the Open supervised device protocol (OSDP) for electronic access control systems. This includes communication settings, commands and replies between the ACU and the peripheral devices. It also includes a mapping of mandatory and optional requirements...

DS/EN IEC 62351-8 - Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control for power system management
June 29, 2020 - DS

IEC 62351-8: 2020 is to facilitate role-based access control (RBAC) for power system management. RBAC assigns human users, automated systems, and software applications (collectively called "subjects" in this document) to specified "roles", and restricts their access to only...

Attribute-Based Encryption and Access Control
March 17, 2020 - CRC

This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications. The goal is to provide in-depth knowledge usable for college students and researchers who want to have a comprehensive understanding of...

DS/ISO/IEC/IEEE 8802-1AE - Telecommunications and exchange between information technology systems – Requirements for local and metropolitan area networks – Part 1AE: Media access control (MAC) security
August 24, 2020 - DS

The scope of this standard is to specify provision of connectionless user data confidentiality, frame data integrity, and data origin authenticity by media access independent protocols and entities that operate transparently to MAC Clients. NOTE-The MAC Clients are as specified in IEEE Std...

ISO/IEC/IEEE 8802-1AE - Telecommunications and exchange between information technology systems — Requirements for local and metropolitan area networks — Part 1AE: Media access control (MAC) security
August 1, 2020 - ISO

The scope of this standard is to specify provision of connectionless user data confidentiality, frame data integrity, and data origin authenticity by media access independent protocols and entities that operate transparently to MAC Clients. NOTE-The MAC Clients are as specified in IEEE Std...

ISA CONTROL VALVES - Control Valves: Practical Guides for Measurement and Control
January 1, 1998 - ISA

Solutions to problems involving the body assemblies, actuators and accessories of control valves, as well as an overview of valve design and construction, this reference book includes discussions of applications, safety, troubleshooting, maintenance, testing, standards, valve-related...

ISO DIS 18541-1 - Road vehicles — Standardized access to automotive repair and maintenance information (RMI) — Part 1: General information and use case definition
July 6, 2020 - ISO

This document provides a general overview and structure of each part of ISO 18541. This document also describes the use cases applicable to the standardized access to automotive RMI. The use cases address real world scenarios (e.g. servicing vehicles) regarding the information access...

DS/EN IEC 62859 - Nuclear power plants – Instrumentation and control systems – Requirements for coordinating safety and cybersecurity
August 31, 2020 - DS

This document provides a framework to manage the interactions between safety and cybersecurity for nuclear power plant (NPP) systems, taking into account the current SC 45A standards addressing these issues and the specifics of nuclear I&C programmable digital systems. NOTE - In this document (as...

Mastering Palo Alto Networks
September 7, 2020 - PACKT

Set up next-generation firewalls from Palo Alto Networks and get to grips with configuring and troubleshooting using the PAN-OS platformKey Features* Understand how to optimally use PAN-OS features* Build firewall solutions to safeguard local, cloud, and mobile networks* Protect your infrastructure...

IEC 62351-8 - Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control for power system management
April 1, 2020 - IEC

The scope of this part of IEC 62351 is to facilitate role-based access control (RBAC) for power system management. RBAC assigns human users, automated systems, and software applications (collectively called "subjects" in this document) to specified "roles", and restricts their...

Advertisement