This document discusses steady-state security regions in power systems. It presents methods to construct steady-state security regions, including an optimization method and expanding method. Numerical examples are provided to compare the size of security regions for the IEEE 6-bus and 30-bus test systems using different methods. The appendix further discusses the standard form of linear programming problems.