Quantcast Selection Attack Analyses Procedure

Share on Google+Share on FacebookShare on LinkedInShare on TwitterShare on DiggShare on Stumble Upon
Custom Search
 
  
 


MIL-HDBK-1013/12
4.4.1
Required Information.  The following information is
required for the system evaluation procedure:
a) Worksheets (see Appendix B):
1)  Cross-Section Evaluation (CSE)
2)  Frame Evaluation (FE)
3)  Anchorage Evaluation (AE)
4)  Wall Evaluation (WE)
4.5
Selection Attack Analyses Procedure.  This procedure
provides structures to analyze security glazing against
ballistic, bomb, and forced entry attacks for a selection
application.  Figure 8 shows the process chart and describes the
selection attack analyses procedure.
4.5.1
Required Information.  The following information is
required for the selection attack analyses procedure:
a) Design Basis Threat.  This information is determined
using Appendix D and is recorded on the Glazing
System Design Criteria Summary worksheet.
4.6
Evaluation Attack Analyses Procedure.  This procedure
provides structures to analyze security glazing against
ballistic, bomb, and forced entry attacks for an evaluation
application.  Figure 9 shows the process chart and describes the
evaluation attack analyses procedure.
36





 


Privacy Statement - Copyright Information. - Contact Us

Integrated Publishing, Inc.
6230 Stone Rd, Unit Q Port Richey, FL 34668

Phone For Parts Inquiries: (727) 493-0744
Google +