PRICES include / exclude VAT
Homepage>IEEE Standards>27 ENERGY AND HEAT TRANSFER ENGINEERING>27.120 Nuclear energy engineering>27.120.20 Nuclear power plants. Safety>IEEE 692-2013 - IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations
Sponsored link
Released: 30.09.2013

IEEE 692-2013 - IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations

IEEE Standard for Criteria for Security Systems for Nuclear Power Generating Stations

Format
Availability
Price and currency
English PDF Redline
Immediate download
148.62 EUR
English PDF Redline
Immediate download
142.88 EUR
English PDF
Immediate download
111.20 EUR
English PDF
Immediate download
106.92 EUR
English Hardcopy
In stock
132.58 EUR
Withdraw:21.03.2024
Standard number:IEEE 692-2013
Released:30.09.2013
ISBN:978-0-7381-8605-4
Pages:57
Status:Active
Status:Inactive
Language:English
DESCRIPTION

IEEE 692-2013

The standard provides criteria for the design, testing, and maintenance of security system electrical, instrumentation, and control equipment for nuclear power generating stations. Such equipment includes permanently or temporarily installed systems, subsystems, and components used by the security force for physical protection of the station against security threats. It includes equipment for security-related detection, assessment, surveillance, access control, communication, and data acquisition.

This standard establishes criteria for the design of an integrated security system for nuclear power generating stations. These criteria assist in the selection and application of equipment to detect, monitor, display, and record security conditions and events.

Revision Standard - Inactive-Reserved. Criteria for the design of an integrated security system for nuclear power generating stations are provided in this standard. Requirements are included for the overall system, interfaces, subsystems, and individual electrical and electronic equipment. This standard addresses equipment for security-related detection, surveillance, access control, communication, data acquisition, and threat assessment.