top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Building information modeling : BIM in current and future practice / / Karen M. Kensek, Douglas Noble
Building information modeling : BIM in current and future practice / / Karen M. Kensek, Douglas Noble
Pubbl/distr/stampa Hoboken, N.J., : Wiley, 2014
Descrizione fisica 1 online resource (xxxii, 397 p.) : ill
Disciplina 690.0285
Altri autori (Persone) KensekKaren M. <1962->
NobleDouglas <1959->
Soggetto topico Building information modeling
ISBN 9781118766309 (hbk.)
9781119174752 (e-book)
1-118-76661-X
1-119-17475-9
1-118-76637-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Design Thinking and BIM -- Chapter 1: Smart Buildings/Smart(er) Designers: BIM and the Creative Design Process -- Chapter 2: Necessity of Cognitive Modeling in BIM's Future -- Chapter 3: Modeling Architectural Meaning -- Chapter 4: Knowledge-Based Building Information Modeling -- Part 2: BIM Analytics -- Chapter 5: Parametric BIM SIM: Integrating Parametric Modeling, BIM, and Simulation for Architectural Design -- Chapter 6: Models and Measurement: Changing Design Value with Simulation, Analysis, and Outcomes -- Chapter 8: Performance Art: Analytics and the New Theater of Design Practice -- Chapter 9: Automated Energy Performance Visualization for BIM -- Chapter 10: Urban Energy Information Modeling: High-Fidelity Aggregated Building Simulation for District Energy Systems -- Chapter 11: BIM and the Predesign Process: Modeling the Unknown -- Chapter 12: Analytical BIM: BIM Fragments, Domain Gaps, and Other Impediments -- Part III : Comprehensive BIM -- Chapter 13: One BIM to Rule Them All: Future Reality or Myth? -- Chapter 14: Component-Based BIM: A Comprehensive, Detailed, Single-Model Strategy -- Chapter 15: BIM Ecosystem: The Coevolution of Products, Processes, and People -- Part IV : Reasoning with BIM -- Chapter 16: BIM, Materials, and Fabrication -- Chapter 17: Communicating Semantics through Model Restructuring and Representation -- Chapter 18: BIM as a Catalyst to Foster Creativity through Collaboration -- Chapter 19: BIM and Virtual Reconstruction: A Long-Term View of (Re-)Modeling -- Part V : Professional BIM -- Chapter 20: Managing BIM Projects, Organizations, and Policies: Turning Aspirations into Quantitative Measures of Success -- Chapter 21: Space: The First (and Final) Frontier of BIM -- Chapter 22: Translating Designs for Construction + Operations: The Future of BIM in a World of Material and Energy Scarcity -- Chapter 23: Marx, BIM, and Contemporary Labor -- Part VI : BIM Speculation -- Chapter 24: Beyond BIM: Next-Generation Building Information Modeling to Support Form, Function, and Use of Buildings -- Chapter 25: Engines of Information: Big Data from Small Buildings -- Chapter 26: BIM and MetaBIM: Design Narrative and Modeling Building Information -- Glossary -- Author Biographies -- Index.
Record Nr. UNINA-9910132201803321
Hoboken, N.J., : Wiley, 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Autore Liew Mun Leong
Edizione [1st edition]
Pubbl/distr/stampa Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Descrizione fisica 1 online resource (214 pages) : color illustrations, photographs
Disciplina 658.409
Soggetto topico Liew, Mun Leong
Soggetto genere / forma Electronic books.
ISBN 1-119-28807-X
1-119-28806-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910466113103321
Liew Mun Leong  
Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Autore Liew Mun Leong
Edizione [1st edition]
Pubbl/distr/stampa Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Descrizione fisica 1 online resource (214 pages) : color illustrations, photographs
Disciplina 658.409
Soggetto topico Liew, Mun Leong
ISBN 1-119-28807-X
1-119-28806-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910798899803321
Liew Mun Leong  
Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Building people . Volume 4 Sunday emails from a chairman / / Mun Leong Liew
Autore Liew Mun Leong
Edizione [1st edition]
Pubbl/distr/stampa Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Descrizione fisica 1 online resource (214 pages) : color illustrations, photographs
Disciplina 658.409
Soggetto topico Liew, Mun Leong
ISBN 1-119-28807-X
1-119-28806-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910826913103321
Liew Mun Leong  
Solaris South Tower, Singapore : , : Changi Airport Group : , : Surbana Juroeng : , : Wiley, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building professionals facing the energy efficiency challenge / / Géraldine Molina, Marjorie Musy, Margot Lefranc
Building professionals facing the energy efficiency challenge / / Géraldine Molina, Marjorie Musy, Margot Lefranc
Autore Molina Géraldine
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2018
Descrizione fisica 1 online resource (313 pages) : illustrations, tables
Disciplina 658.26
Collana Energy Series
Soggetto topico Buildings - Energy conservation
ISBN 1-119-47671-2
1-119-47666-6
1-119-47662-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Look at "Performance" Buildings: An Interdisciplinary Survey of Professionals -- Uneasiness Among Professionals: Multiple Obstacles -- The Characteristics of the Pioneers: Trajectories, Construction, and the Advancement of Their Skills -- Appendix: Selection of First-Hand Accounts from Building Area Participants. Selection of First-Hand Accounts from Building Area Participants.
Record Nr. UNINA-9910271036203321
Molina Géraldine  
London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building professionals facing the energy efficiency challenge / / Géraldine Molina, Marjorie Musy, Margot Lefranc
Building professionals facing the energy efficiency challenge / / Géraldine Molina, Marjorie Musy, Margot Lefranc
Autore Molina Géraldine
Pubbl/distr/stampa London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2018
Descrizione fisica 1 online resource (313 pages) : illustrations, tables
Disciplina 658.26
Collana Energy Series
Soggetto topico Buildings - Energy conservation
ISBN 1-119-47671-2
1-119-47666-6
1-119-47662-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Look at "Performance" Buildings: An Interdisciplinary Survey of Professionals -- Uneasiness Among Professionals: Multiple Obstacles -- The Characteristics of the Pioneers: Trajectories, Construction, and the Advancement of Their Skills -- Appendix: Selection of First-Hand Accounts from Building Area Participants. Selection of First-Hand Accounts from Building Area Participants.
Record Nr. UNINA-9910821917603321
Molina Géraldine  
London, England ; ; Hoboken, New Jersey : , : ISTE : , : Wiley, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Autore Fitschen Keith
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2013
Descrizione fisica 1 online resource (304 p.)
Collana Wiley trading series
Soggetto topico Commodity exchanges
Soggetto genere / forma Electronic books.
ISBN 1-118-65661-X
1-118-63561-2
1-118-63581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trading-Day-of-the-Week Filter (Commodities)
Record Nr. UNINA-9910141687603321
Fitschen Keith  
Hoboken, N.J., : Wiley, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Autore Fitschen Keith
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2013
Descrizione fisica 1 online resource (304 p.)
Collana Wiley trading series
Soggetto topico Commodity exchanges
ISBN 1-118-65661-X
1-118-63561-2
1-118-63581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trading-Day-of-the-Week Filter (Commodities)
Record Nr. UNINA-9910829861503321
Fitschen Keith  
Hoboken, N.J., : Wiley, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Building reliable trading systems [[electronic resource] ] : tradable strategies that perform as they backtest and meet your risk-reward goals / / Keith Fitschen
Autore Fitschen Keith
Edizione [1st edition]
Pubbl/distr/stampa Hoboken, N.J., : Wiley, c2013
Descrizione fisica 1 online resource (304 p.)
Collana Wiley trading series
Soggetto topico Commodity exchanges
ISBN 1-118-65661-X
1-118-63561-2
1-118-63581-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Trading-Day-of-the-Week Filter (Commodities)
Record Nr. UNINA-9910840667203321
Fitschen Keith  
Hoboken, N.J., : Wiley, c2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Building secure cars : assuring the automotive software development lifecycle / / Dennis Kengo Oka
Building secure cars : assuring the automotive software development lifecycle / / Dennis Kengo Oka
Autore Oka Dennis Kengo
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , [2021]
Descrizione fisica 1 online resource (xiii, 304 pages) : illustrations
Disciplina 629.272
Soggetto topico Automotive telematics - Security measures
ISBN 1-119-71077-4
1-119-71078-2
1-119-71076-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright -- Contents -- Preface -- About the Author -- Chapter 1 Overview of the Current State of Cybersecurity in the Automotive Industry -- 1.1 Cybersecurity Standards, Guidelines, and Activities -- 1.2 Process Changes, Organizational Changes, and New Solutions -- 1.3 Results from a Survey on Cybersecurity Practices in the Automotive Industry -- 1.3.1 Survey Methods -- 1.3.2 Report Results -- 1.3.2.1 Organizational Challenges -- 1.3.2.2 Technical Challenges -- 1.3.2.3 Product Development and Security Testing Challenges -- 1.3.2.4 Supply Chain and Third‐Party Components Challenges -- 1.3.3 How to Address the Challenges -- 1.3.3.1 Organizational Takeaways -- 1.3.3.2 Technical Takeaways -- 1.3.3.3 Product Development and Security Testing Takeaways -- 1.3.3.4 Supply Chain and Third‐Party Components Takeaways -- 1.3.3.5 Getting Started -- 1.3.3.6 Practical Examples of Organizations Who Have Started -- 1.3.3.7 -- 1.4 Examples of Vulnerabilities in the Automotive Industry -- 1.5 Chapter Summary -- References -- Chapter 2 Introduction to Security in the Automotive Software Development Lifecycle -- 2.1 V‐Model Software Development Process -- 2.2 Challenges in Automotive Software Development -- 2.3 Security Solutions at each Step in the V‐Model -- 2.3.1 Cybersecurity Requirements Review -- 2.3.2 Security Design Review -- 2.3.3 Threat Analysis and Risk Assessment -- 2.3.4 Source Code Review -- 2.3.5 Static Code Analysis -- 2.3.6 Software Composition Analysis -- 2.3.7 Security Functional Testing -- 2.3.8 Vulnerability Scanning -- 2.3.9 Fuzz Testing -- 2.3.10 Penetration Testing -- 2.3.11 Incident Response and Updates -- 2.3.12 Continuous Cybersecurity Activities -- 2.3.13 Overall Cybersecurity Management -- 2.4 New Technical Challenges -- 2.5 Chapter Summary -- References -- Chapter 3 Automotive‐Grade Secure Hardware.
3.1 Need for Automotive Secure Hardware -- 3.2 Different Types of HSMs -- 3.3 Root of Trust: Security Features Provided by Automotive HSM -- 3.3.1 Secure Boot -- 3.3.2 Secure In‐Vehicle Communication -- 3.3.3 Secure Host Flashing -- 3.3.4 Secure Debug Access -- 3.3.5 Secure Logging -- 3.4 Chapter Summary -- References -- Chapter 4 Need for Automated Security Solutions in the Automotive Software Development Lifecycle -- 4.1 Main Challenges in the Automotive Industry -- 4.2 Automated Security Solutions During the Product Development Phases -- 4.2.1 Static Code Analysis -- 4.2.2 Software Composition Analysis -- 4.2.3 Security Testing -- 4.2.4 Automation and Traceability During Software Development -- 4.3 Solutions During Operations and Maintenance Phases -- 4.3.1 Cybersecurity Monitoring, Vulnerability Management, Incident Response, and OTA Updates -- 4.4 Chapter Summary -- References -- Chapter 5 Static Code Analysis for Automotive Software -- 5.1 Introduction to MISRA and AUTOSAR Coding Guidelines -- 5.2 Problem Statement: MISRA and AUTOSAR Challenges -- 5.3 Solution: Workflow for Code Segmentation, Guideline Policies, and Deviation Management -- 5.3.1 Step 1: Segment the Codebase into Different Categories/Components Based on Risk -- 5.3.2 Step 2: Specify Guideline Policies (Set of Guidelines to Apply) Depending on Risk Categories -- 5.3.3 Step 3: Perform the Scan and Plan the Approach for Prioritization of Findings -- 5.3.4 Step 4: Prioritize Findings Based on the Risk Categories and Guideline Policies and Determine How to Handle Each Finding, e.g. Fix or Leave as Deviation -- 5.3.5 Step 5: Follow a Defined Deviation Management Process, Including Approval Steps -- 5.3.6 Step 6: Report on MISRA or AUTOSAR Coding Guidelines Compliance Including Deviations -- 5.4 Chapter Summary -- References.
Chapter 6 Software Composition Analysis in the Automotive Industry -- 6.1 Software Composition Analysis: Benefits and Usage Scenarios -- 6.2 Problem Statement: Analysis of Automotive Software Open‐Source Software Risks -- 6.2.1 Analysis Results -- 6.2.1.1 zlib -- 6.2.1.2 libpng -- 6.2.1.3 OpenSSL -- 6.2.1.4 curl -- 6.2.1.5 Linux Kernel -- 6.2.2 Discussion -- 6.3 Solution: Countermeasures on Process and Technical Levels -- 6.3.1 Fully Inventory Open‐Source Software -- 6.3.2 Use Appropriate Software Composition Analysis Approaches -- 6.3.3 Map Open‐Source Software to Known Security Vulnerabilities -- 6.3.4 Identify License, Quality, and Security Risks -- 6.3.5 Create and Enforce Open‐Source Software Risk Policies -- 6.3.6 Continuously Monitor for New Security Threats and Vulnerabilities -- 6.3.7 Define and Follow Processes for Addressing Vulnerabilities in Open‐Source Software -- 6.3.8 How to Get Started -- 6.4 Chapter Summary -- References -- Chapter 7 Overview of Automotive Security Testing Approaches -- 7.1 Practical Security Testing -- 7.1.1 Security Functional Testing -- 7.1.2 Vulnerability Scanning -- 7.1.3 Fuzz Testing -- 7.1.4 Penetration Testing -- 7.2 Frameworks for Security Testing -- 7.3 Focus on Fuzz Testing -- 7.3.1 Fuzz Engine -- 7.3.2 Injector -- 7.3.3 Monitor -- 7.4 Chapter Summary -- References -- Chapter 8 Automating Fuzz Testing of In‐Vehicle Systems by Integrating with Automotive Test Tools -- 8.1 Overview of HIL Systems -- 8.2 Problem Statement: SUT Requires External Input and Monitoring -- 8.3 Solution: Integrating Fuzz Testing Tools with HIL Systems -- 8.3.1 White‐Box Approach for Fuzz Testing Using HIL System -- 8.3.1.1 Example Test Setup Using an Engine ECU -- 8.3.1.2 Fuzz Testing Setup for the Engine ECU -- 8.3.1.3 Fuzz Testing Setup Considerations -- 8.3.2 Black‐Box Approach for Fuzz Testing Using HIL System.
8.3.2.1 Example Target System Setup Using Engine and Body Control Modules -- 8.3.2.2 Fuzz Testing Setup Using Duplicate Engine and Body Control Modules -- 8.3.2.3 Fuzz Testing Setup Considerations -- 8.4 Chapter Summary -- References -- Chapter 9 Improving Fuzz Testing Coverage by Using Agent Instrumentation -- 9.1 Introduction to Agent Instrumentation -- 9.2 Problem Statement: Undetectable Vulnerabilities -- 9.2.1 Memory Leaks -- 9.2.2 Core Dumps and Zombie Processes -- 9.2.3 Considerations for Addressing Undetectable Vulnerabilities -- 9.3 Solution: Using Agents to Detect Undetectable Vulnerabilities -- 9.3.1 Overview of the Test Environment -- 9.3.2 Modes of Operation -- 9.3.2.1 Synchronous Mode -- 9.3.2.2 Asynchronous Mode -- 9.3.2.3 Hybrid Approach -- 9.3.3 Examples of Agents -- 9.3.3.1 AgentCoreDump -- 9.3.3.2 AgentLogTailer -- 9.3.3.3 AgentProcessMonitor -- 9.3.3.4 AgentPID -- 9.3.3.5 AgentAddressSanitizer -- 9.3.3.6 AgentValgrind -- 9.3.3.7 An Example config.json Configuration File -- 9.3.4 Example Results from Agent Instrumentation -- 9.3.4.1 Bluetooth Fuzz Testing -- 9.3.4.2 Wi‐Fi Fuzz Testing -- 9.3.4.3 MQTT Fuzz Testing -- 9.3.4.4 File Format Fuzz Testing -- 9.3.5 Applicability and Automation -- 9.4 Chapter Summary -- References -- Chapter 10 Automating File Fuzzing over USB for Automotive Systems -- 10.1 Need for File Format Fuzzing -- 10.2 Problem Statement: Manual Process for File Format Fuzzing -- 10.3 Solution: Emulated Filesystems to Automate File Format Fuzzing -- 10.3.1 System Architecture Overview -- 10.3.2 Phase One Implementation Example: Prepare Fuzzed Files -- 10.3.3 Phase Two Implementation Example: Automatically Emulate Filesystems -- 10.3.4 Automating User Input -- 10.3.5 Monitor for Exceptions -- 10.4 Chapter Summary -- References.
Chapter 11 Automation and Traceability by Integrating Application Security Testing Tools into ALM Systems -- 11.1 Introduction to ALM Systems -- 11.2 Problem Statement: Tracing Secure Software Development Activities and Results to Requirements and Automating Application Security Testing -- 11.3 Solution: Integrating Application Security Testing Tools with ALM Systems -- 11.3.1 Concept -- 11.3.1.1 Static Code Analysis - Example -- 11.3.1.2 Software Composition Analysis - Example -- 11.3.1.3 Vulnerability Scanning - Example -- 11.3.1.4 Fuzz Testing - Example -- 11.3.1.5 Concept Overview -- 11.3.2 Example Implementation -- 11.3.2.1 Defensics -- 11.3.2.2 codeBeamer ALM -- 11.3.2.3 Jenkins -- 11.3.2.4 SUT -- 11.3.2.5 Implementation Overview -- 11.3.3 Considerations -- 11.4 Chapter Summary -- References -- Chapter 12 Continuous Cybersecurity Monitoring, Vulnerability Management, Incident Response, and Secure OTA Updates -- 12.1 Need for Cybersecurity Monitoring and Secure OTA Updates -- 12.2 Problem Statement: Software Inventory, Monitoring Vulnerabilities, and Vulnerable Vehicles -- 12.3 Solution: Release Management, Monitoring and Tracking, and Secure OTA Updates -- 12.3.1 Release Management -- 12.3.2 Monitoring and Tracking -- 12.3.2.1 Solutions in Other Industries -- 12.3.2.2 Solutions in the Automotive Industry -- 12.3.2.3 Example Automotive SOC Overview -- 12.3.2.4 Example Automotive SOC Workflow -- 12.3.2.5 Newly Detected Vulnerabilities in Open‐Source Software - Example -- 12.3.3 Secure OTA Updates -- 12.3.3.1 Identify Vulnerable Vehicles Targeted for OTA Updates -- 12.3.3.2 Perform Secure OTA Updates -- 12.3.3.3 Target Systems for OTA Updates -- 12.3.3.4 Overview of Secure OTA Update Process for ECUs -- 12.3.3.5 Standardization and Frameworks for OTA Updates -- 12.4 Chapter Summary -- References -- Chapter 13 Summary and Next Steps -- Index.
EULA.
Record Nr. UNINA-9910555069303321
Oka Dennis Kengo  
Hoboken, New Jersey : , : Wiley, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...