02681nam 2200613 450 991078790350332120200520144314.00-12-810290-X0-12-417306-3(CKB)2670000000578334(EBL)1873125(SSID)ssj0001413804(PQKBManifestationID)11808544(PQKBTitleCode)TC0001413804(PQKBWorkID)11431278(PQKB)11236491(CaSebORM)9780124172487(Au-PeEL)EBL1873125(CaPaEBR)ebr10992085(CaONFJC)MIL665382(OCoLC)897115959(MiAaPQ)EBC1873125(PPN)240178459(EXLCZ)99267000000057833420141212h20152015 uy 0engur|n|---|||||txtccrNuclear power plant safety and mechanical integrity design and operability of mechanical systems, equipment and supporting structures /George Antaki and Ramiz Gilada1st editionOxford, England ;Waltham, Massachusetts :Butterworth-Heinemann,2015.©20151 online resource (355 p.)Includes index.1-322-34100-1 0-12-417248-2 Front Cover; 1.1 REQUIREMENTS; 1.2 CLASSIFICATION; 2.3 DYNAMIC LOADS; 2.4 VIBRATION TESTING AND MONITORING; 2.6 SPECIAL ANALYSES; 5.7 SCAFFOLD; 5.8 CASE STUDY; 5.9 COMPONENT CLEARANCESOne of the most critical requirements for safe and reliable nuclear power plant operations is the availability of competent maintenance personnel. However, just as the nuclear power industry is experiencing a renaissance, it is also experiencing an exodus of seasoned maintenance professionals due to retirement. The perfect guide for engineers just entering the field or experienced maintenance supervisors who need to keep abreast of the latest industry best practices, Nuclear Power Plant Maintenance: Mechanical Systems, Equipment and Safety covers the most common issues faced in day-to-day operNuclear power plantsDesign and constructionNuclear reactorsSafety measuresNuclear power plantsDesign and construction.Nuclear reactorsSafety measures.621.4832Antaki George1483885Gilada RamizMiAaPQMiAaPQMiAaPQBOOK9910787903503321Nuclear power plant safety and mechanical integrity3702203UNINA03833nam 2200565 a 450 991078463190332120200520144314.01-59327-232-4(CKB)1000000000385342(OCoLC)567931383(CaPaEBR)ebrary10211743(SSID)ssj0000277425(PQKBManifestationID)11240445(PQKBTitleCode)TC0000277425(PQKBWorkID)10234051(PQKB)11041815(Au-PeEL)EBL3017628(CaPaEBR)ebr10211743(OCoLC)923652675(CaSebORM)9781593271657(MiAaPQ)EBC3017628(EXLCZ)99100000000038534220071015d2008 uy 0engurcn|||||||||txtccrThe book of PF[electronic resource] a no-nonsense guide to the OpenBSD firewall /by Peter N.M. Hansteen1st editionSan Francisco No Starch Pressc20081 online resource (188 p.)Includes index.1-59327-165-4 Includes bibliographical references (p. 136-140) and index.What PF is -- Let's get on with it -- Into the real world -- Wireless networks made easy -- Bigger or trickier networks -- Turning the tables for proactive defense -- Queues, shaping, and redundancy -- Logging, monitoring, and statistics -- Getting your setup just right.OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules. Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to: Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoid The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.TCP/IP (Computer network protocol)Firewalls (Computer security)TCP/IP (Computer network protocol)Firewalls (Computer security)005.8Hansteen Peter N. M955140MiAaPQMiAaPQMiAaPQBOOK9910784631903321The book of PF3826752UNINA