LEADER 03260nam 2200613 450 001 9910453527903321 005 20200520144314.0 010 $a1-118-65429-3 035 $a(CKB)2550000001184172 035 $a(EBL)1629163 035 $a(SSID)ssj0001084782 035 $a(PQKBManifestationID)11683014 035 $a(PQKBTitleCode)TC0001084782 035 $a(PQKBWorkID)11053657 035 $a(PQKB)11034028 035 $a(MiAaPQ)EBC1629163 035 $a(DLC) 2013033011 035 $a(Au-PeEL)EBL1629163 035 $a(CaPaEBR)ebr10828156 035 $a(CaONFJC)MIL563492 035 $a(OCoLC)855858318 035 $a(EXLCZ)992550000001184172 100 $a20140128h20142014 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSustainable concrete solutions /$fCostas Georgopoulos, Andrew Minson 210 1$aChichester, England ;$aOxford, England :$cWiley-Blackwell,$d2014. 210 4$d©2014 215 $a1 online resource (226 p.) 300 $aDescription based upon print version of record. 311 $a1-119-96864-X 311 $a1-306-32241-3 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aMachine generated contents note: Preface Foreword Professor Jacqui Glass Chair in Architecture and Sustainable Construction, Loughborough University 1. Introduction 1.1 Sustainability and Sustainable Development 1.2 The Role of the Design Team in Sustainable Development 1.3 Sustainability Credentials of Concrete 1.4 Book Layout and Context 2. Challenges & Responses 2.1 Introduction 2.2 Climate Change 2.3 Environmental Protection 2.4 Social Progress 2.5 Economic Growth 2.6 Regulatory Responses 2.7 Summary 3. Conceptual Design of Buildings & Infrastructure 3.1 Introduction 3.2 Conceptual Design of Buildings 3.3 Conceptual Design of Infrastructure 3.4 Summary 4. Material Specification 4.1 Introduction 4.2 Assessing Environmental Impacts of Materials 4.3 Responsible Sourcing of Materials 4.4 Cements and Combinations 4.5 Aggregates 4.6 Water 4.7 Admixtures 4.8 Novel Constituents 4.9 Reinforcement 4.10 Special Concretes 4.11 Specification Examples 4.12 Summary 5. Construction, Operation and End of Life 5.1 Construction 5.2 Operation 5.3 End of Life 5.4 Summary Appendix A: Thermal Mass Appendix B: Biomass Product Appendix C: Choice of Concrete Slab Options Appendix D: Worked Example on Embodied CO2 for a Building Slab Index . 330 $a"The book will provide students with a thorough evaluation of the advantages and disadvantages of concrete a sustainable building material"--$cProvided by publisher. 606 $aConcrete construction$xEnvironmental aspects 606 $aSustainable buildings 608 $aElectronic books. 615 0$aConcrete construction$xEnvironmental aspects. 615 0$aSustainable buildings. 676 $a624.1/8340286 686 $aBUS072000$2bisacsh 700 $aGeorgopoulos$b Costas$0923158 701 $aMinson$b Andrew$0923159 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453527903321 996 $aSustainable concrete solutions$92071547 997 $aUNINA LEADER 07325nam 22008295 450 001 996466144403316 005 20200707002528.0 010 $a3-540-38343-3 024 7 $a10.1007/11836810 035 $a(CKB)1000000000283884 035 $a(SSID)ssj0000318266 035 $a(PQKBManifestationID)11245588 035 $a(PQKBTitleCode)TC0000318266 035 $a(PQKBWorkID)10308177 035 $a(PQKB)11700305 035 $a(DE-He213)978-3-540-38343-7 035 $a(MiAaPQ)EBC3068190 035 $a(PPN)123137799 035 $a(EXLCZ)991000000000283884 100 $a20100301d2006 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security$b[electronic resource] $e9th International Conference; ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings /$fedited by Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Bart Preneel 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XIV, 548 p.) 225 1 $aSecurity and Cryptology ;$v4176 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-38341-7 320 $aIncludes bibliographical references and index. 327 $aSoftware Security -- Extending .NET Security to Unmanaged Code -- Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation -- Privacy and Anonymity -- Low Latency Anonymity with Mix Rings -- Breaking Four Mix-Related Schemes Based on Universal Re-encryption -- Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy -- Protecting Data Privacy Through Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round SHACAL-2 -- On the Collision Resistance of RIPEMD-160 -- Digital Signatures -- Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption -- Multi-party Concurrent Signatures -- Formal Security Model of Multisignatures -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles -- Cryptanalysis of the Bluetooth E 0 Cipher Using OBDD?s -- Encryption I -- A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice -- On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search -- Collusion-Free Policy-Based Encryption -- Pervasive Computing -- Using Multiple Smart Cards for Signing Messages at Malicious Terminals -- Diverging Keys in Wireless Sensor Networks -- Encryption II -- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption -- Transparent Image Encryption Using Progressive JPEG -- Network Security -- Preserving TCP Connections Across Host Address Changes -- A Security Architecture for Protecting LAN Interactions -- Simulation of Internet DDoS Attacks and Defense -- SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr -- Watermarking and DRM -- Rights Protection for Data Cubes -- An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) -- Intrusion Detection and Worms -- Resistance Analysis to Intruders? Evasion of Detecting Intrusion -- A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks -- Anomaly Intrusion Detection Based on Clustering a Data Stream -- Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation -- Key Exchange -- An Authentication and Key Exchange Protocol for Secure Credential Services -- A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders -- Security Protocols and Formal Methods -- Formalising Receipt-Freeness -- Enhancing the Security and Efficiency of 3-D Secure -- Designing and Verifying Core Protocols for Location Privacy -- Information Systems Security -- Delegation in a Distributed Healthcare Context: A Survey of Current Approaches -- Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. 330 $ath This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, during August 30 ? September 2, 2006. The Conference was organized by the University of the Aegean, Greece. ISC was first initiated as a workshop, ISW in Japan in 1997, ISW 1999 in Mal- sia, ISW 2000 in Australia and then changed to the current name ISC when it was held in Spain in 2001 (ISC 2001). The latest conferences were held in Brazil (ISC 2002), UK (ISC 2003), USA (ISC 2004), and Singapore (ISC 2005). ISC 2006 provided an international forum for sharing original research results and application experiences among specialists in fundamental and applied problems of - formation security. In response to the Call for Papers, 188 papers were submitted. Each paper was - viewed by three members of the PC, on the basis of their significance, novelty, and technical quality. Of the papers submitted, 38 were selected for presentation, with an acceptance rate of 20%. 410 0$aSecurity and Cryptology ;$v4176 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aComputer communication systems 606 $aSpecial purpose computers 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aSpecial Purpose and Application-Based Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I13030 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aComputer communication systems. 615 0$aSpecial purpose computers. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aKatsikas$b Sokratis K$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBackes$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGritzalis$b Stefanos$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aPreneel$b Bart$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aISC (Conference : Information security) 906 $aBOOK 912 $a996466144403316 996 $aInformation Security$9771885 997 $aUNISA LEADER 01046nam a2200241 i 4500 001 991000819599707536 005 20020506124720.0 008 930524s1974 it m ||| | ita d 035 $ab10134086-39ule_inst 035 $aLE00637378$9ExL 040 $aDip.to Fisica$beng 100 1 $aParlati, Luigi$0357337 245 10$aAssegnazione degli stati interni dei circuiti sequenziali. Tesi di laurea /$claureando Luigi Parlati ; relatore Giovanni Russo 260 $aLecce :$bUniversitą degli Studi. Facoltą di Scienze. Corso di laurea in Fisica,$ca.a. 1974-75 300 $a117 p. :$bill. ;$c30 cm 502 $aTesi. Universitą degli Studi di Lecce, 1975 700 1 $aRusso, Giovanni 907 $a.b10134086$b02-04-14$c27-06-02 912 $a991000819599707536 945 $aLE006 T138$g1$i2006000152587$lle006$o-$pE0.00$q-$rn$so $t0$u0$v0$w0$x0$y.i10157724$z27-06-02 996 $aAssegnazione degli stati interni dei circuiti sequenziali. Tesi di laurea$9185501 997 $aUNISALENTO 998 $ale006$b01-01-93$cm$da $e-$fita$git $h0$i1 LEADER 02534ojm 2200253z- 450 001 9910148782503321 005 20230912161814.0 010 $a0-00-726914-5 035 $a(CKB)3710000000922926 035 $a(BIP)014360441 035 $a(EXLCZ)993710000000922926 100 $a20231107c2007uuuu -u- - 101 0 $aeng 200 10$a3 Para 210 $cHarperCollins UK 330 8 $aAfghanistan, Summer 2006. This is war.Afghanistan in the summer of 2006. In blazing heat in remote outposts the 3 Para battlegroup is pitted against a stubborn enemy who keep on coming. Until now, the full story of what happened there has not been told. This is it.In April 2006, the elite 3 Para battlegroup was despatched to Helmand Province in southern Afghanistan. They were tasked with providing security to reconstruction efforts, a deployment it was hoped would pass off without a shot being fired. In fact, over the six months they were there, the 3 Para battle group saw near continuous combat - one gruelling battle after another - in what would become one of the most extraordinary campaigns ever fought by British troops.Around parched, dusty outposts reliant on a limited number of helicopters for food and ammunition resupply, troops were subjected to relentless Taliban attacks, as well as energy-sapping 50 degree heat and spartan conditions. At the end of the tour, the Taliban offensive aimed at driving the British and Afghan Government troops out of Helmand had been tactically defeated. But 3 Para paid a high price: fourteen soldiers and one interpreter were killed, and 46 wounded.'3 Para' will tell the stories of the men and women who took part in this extraordinary and largely unreported saga. Best-selling author Patrick Bishop has been given exclusive access to the soldiers whose tales of courage and endurance provide an unforgettable portrait of one of the world's finest and most fascinating fighting regiments, and a remarkable band of warriors. Their bravery was reflected in the array of gallantry medals that were bestowed on their return, including the Victoria Cross awarded to Corporal Bryan Budd and the George Cross won by Corporal Mark Wright, both of whom were killed winning their awards.3 Para's saga of comradeship, courage and fortitude is set to become a classic. 676 $a958.1047 700 $aBishop$b Patrick$01451872 702 $aNicholl$b Kati$4oth 702 $aRodska$b Christian$4oth 906 $aAUDIO 912 $a9910148782503321 996 $a3 Para$93654669 997 $aUNINA