Wind Energy Systems for Electric Power Generation: Green Energy and Technology



Manfred Stiebler, «Wind Energy Systems for Electric Power Generation: Green Energy and Technology»
Springer Berlin Heidelberg | ISBN: 3642088260 | 2009 | PDF | 212 pages | 12.8 MB

This book deals with the electronics of Wind-Energy systems and their implementation into the grid. Starting from an overview on energy conversion and general concepts for Wind Energy systems, the concept, design and control of the electrical components are treated: generators, converters and storage devices. Much attention is spent on the implementation of Wind turbines and the requirements for power quality are non-trivial tasks. In this way, the book provides the fundamental knowledge for designer and developer of wind energy systems.


download

download

download

mirror

"Worldmark Encyclopedia of the States" ed. by Timothy L. Gall



"Worldmark Encyclopedia of the States" ed. by Timothy L. Gall
with District of Columbia, Puerto Rico, U.S. Dependencies, and U.S. Overview; 7th edition
Thomson Gale | 2007 | ISBN: 1414410581, 1414411219, 1414411227, 1414411146 | 1039 pages | PDF/djvu | 28/21 MB

Worldmark Encyclopedia of the States, 7th Edition, presents easy-to-understand information on all 50 U.S. states, the District of Columbia, Puerto Rico, and all U.S. dependencies in 2 volumes.

vol.1 PDF: pdf1 iFi Download • | • pdf1 MegaUp Mirror • | • pdf1 ES Download

Internet Security Dictionary

Internet Security Dictionary
Publisher: Springer | ISBN: 0387952616 | edition 2002 | PDF | 278 pages | 25,8 mb

The explosive growth of the Internet, inherent flaws in its basic structure, and the need to transfer sensitive information for Internet applications like electronic mail, Internet banking and Internet commerce have resulted in serious security concerns. This dictionary provides authoritative definitions and descriptions of terms related to Internet security.
The Internet Security Dictionary details over 1,800 terms and covers eight main areas: * Authentication, including biometrics, encryption/public key infrastructure, digital signatures, time-stamping, and certificate management * Encryption * Network-level security, including IP, IPSec, SHTTP, and SSL * Firewalls and remote management * Internet security policies, risk analysis, integration across platforms, management and auditing * Mobile code security, Java/Active X/scripts, and mobile agent code * Virus protection and intrusion detection * Security in Internet commerce.



Depositfiles

TurboBit

Filesonic