| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910164295103321 |
|
|
Titolo |
Up against the wall : an examination of building envelope interface techniques and systems |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Place of publication not identified], : ASTM International, 2010 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Collana |
|
Journal of ASTM International selected technical papers Up against the wall |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Exterior walls |
Siding (Building materials) |
Waterproofing |
Windows |
Civil & Environmental Engineering |
Engineering & Applied Sciences |
Civil Engineering |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di contenuto |
|
What we do not know : perspectives on wall-window combinations and performance assurance we have yet to address / R. C. Mathis and S. Johnson -- An investigation of climate loads on building facades for selected locations in the United States / S. M. Cornick and M. A. Lacasse -- The effect of air cavity convection on the wetting and drying behavior of wood-frame walls using a multi-physics approach / A. N. Karagiozis and H. M. Kuenzel -- Design responsibility for weathertight perimeter detailing for non-flanged windows : current practices, common problems, and possible solutions / L. D. Flick ... [et al.]. -- How to detect and observe hidden window leaks using infrared thermography / R. W. LaTona and O. Viagea -- Condensation damage behind self-adhering membrane flashing and interior furnishings on exterior residential walls / C. Ofori-Amanfo and M. J. Spink -- Towards development of a performance standard for asessing the effectiveness of wall-window interface details to manage rainwater intrusion / M.A. Lacasse ... [et al.]. -- Evaluating drainage characteristics of water |
|
|
|
|
|
|
|
|
|
|
|
|
|
resistive barriers s part of an overall durable wall approach for the building enclosure / M. F. Williams -- Extreme exposure fenestration installations : the Florida challenge / J. D. Katsaros and C. G. Carll -- A robust installation for brick-mold windows and doors using self-adhered flashing / J. S. Conlon ... [et al.]. -- Laboratory tests of water penetration through wall-window interfaces based on U.S. residential window installation practice / M. A. Lacasse ... [et al.]. -- Assessing the effectiveness of wall-window interface details to manage rainwater : selected results from window installation to wall sheathed in extruded polystyrene / M. A. Lacasse ... [et al.]. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910324040803321 |
|
|
Autore |
Breeur Roland |
|
|
Titolo |
Affectivité, imaginaire, création sociale / / Raphaël Gély, Laurent Van Eynde |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Bruxelles : , : Presses de l’Université Saint-Louis, , 2018 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (308 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
CorcuffPhilippe |
FrogneuxNathalie |
GélyRaphaël <1966-> |
GiovannangeliDaniel |
KlimisSophie |
LaoureuxSébastien |
LouteAlain <1979-> |
MazzùAntonino |
EyndeLaurent van <1967-> |
|
|
|
|
|
|
|
|
Soggetti |
|
Philosophy |
affectivité |
imagination |
création sociale |
neutralisation |
reconnaissance |
altermondialisme |
espace commun |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
|
|
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Les recherches rassemblées dans cet ouvrage collectif visent à déterminer la place de l'affectivité et celle de l'imaginaire dans l'accroissement de la capacité des individus à entrer dans un processus de création sociale. Il ne s'agit pas de faire une revue de la littérature consacrée à cette question, ni de développer une conception spécifique du rapport entre l'affectivité, l'imaginaire et la création sociale, mais bien de mettre en évidence une série de présupposés tant anthropologiques que normatifs autour desquels les conceptions de l'affectivité, de l'imaginaire et de la création sociale s'articulent. S'il y a un rapport de corrélation entre l'affectivité, l'imaginaire et la création sociale, toute conception de l'affectivité en appelle intrinsèquement à une certaine conception de l'imaginaire, cette articulation chaque fois spécifique entre affectivité et imaginaire en appelant à son tour à une certaine conception de la création sociale, et inversement. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910983392803321 |
|
|
Autore |
Murphy Christopher |
|
|
Titolo |
Quantum Security : Revolutionizing Network Security with Digital IDs / / by Christopher Murphy |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (103 pages) |
|
|
|
|
|
|
Collana |
|
Apress Pocket Guides, , 3004-9288 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security - Technological innovations |
Quantum computing |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Chapter 1. The Origins of Cybersecurity -- Chapter 2. The Devil is in the Details -- Chapter 3. The Science of Authentication -- Chapter 4. The Failure of Indirect Interaction -- Chapter 5. Digital IDs: The Solution That Was Ignored -- Chapter 6. Direct User Interaction: The Game Changer -- Chapter 7. Digital Superposition: A New Layer in |
|
|
|
|
|
|
|
|
|
|
|
Network Security -- Chapter 8. Rethinking Security: Insights from Einstein and Hawking -- Chapter 9. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 10. The Illusion of MFA Compliance -- Chapter 11. Pre-Authentication vs. Post-Authentication in Network Security -- Chapter 12. Digital ID: Transforming Key Industries -- Chapter 13. The Mitigations That No Longer Matter -- Chapter 14. The Battle for Integrity in Security -- Chapter 15. Big Data Vs. Network Security -- Chapter 16. The Future of Network Security -- Chapter 17. Implementing the Change -- Chapter 18. Digital ID as the New Endpoint -- Chapter 19. The Inescapable Conflict: Public vs. Private in Cybersecurity -- Chapter 20. The Unified Quantum Security Model: A New Approach to Cybersecurity -- Chapter 21. The Urgency of Action. |
|
|
|
|
|
|
Sommario/riassunto |
|
In a world where cybersecurity threats evolve daily, it’s time to leave traditional, flawed security models behind. This book introduces a groundbreaking approach that applies the quantum principle of superposition to user authentication. Just as a particle exists in multiple states until observed, a user’s presence on a network remains undefined until their Digital ID is verified. Once verified, their identity collapses into a single truth—eliminating any risk of impersonation or fraud. This book demonstrates how Digital IDs transform the very foundation of network security. Unlike conventional methods, where user identity is indirectly represented through data, this model ties a user’s existence directly to their Digital ID. By securing user presence—and absence—this new authentication model offers unparalleled protection from unauthorized access and common cyber threats like stolen credentials or malicious impersonation. It equips cybersecurity professionals, C-suite executives, and decision-makers with practical, actionable steps for seamlessly integrating this new technology into existing infrastructures. Readers will explore how Digital IDs create a secure, private interface when connected to the network, and how they prevent unauthorized actions when the user is absent. This innovative shift moves security from reactive mitigation strategies to proactive solutions that ensure both trust and control. What You Will Learn: The difference between indirect and direct authentication and how the current cybersecurity approach is fundamentally flawed. Practical steps for implementing digital IDs and direct user interaction to eliminate common cyber threats. How to shift from reactive mitigation strategies to proactive, long-term security solutions that significantly reduce vulnerabilities. Straightforward, actionable insights on how to transform current cybersecurity infrastructures for more robust protection. |
|
|
|
|
|
|
|
| |