Phisical Vulnerability Proxies from Remotes Sensing: Reviewing, Implementing and Disseminating Selected Techniques