| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910704881803321 |
|
|
Titolo |
Earned Value Management (EVM) implementation handbook |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, D.C. : , : National Aeronautics and Space Administration, NASA headquarters, , 2013 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (viii pages, 94 unnumbered pages) : color illustrations |
|
|
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Soggetti |
|
Contract management |
Handbooks |
Manuals |
Procurement policy |
Project management |
Project planning |
Quality control |
Research management |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed June 10, 2014). |
"February 2013." |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996335773703316 |
|
|
Titolo |
Building supply business |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Des Plaines, IL, : Cahners Pub. Co., c1995-c1996 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Hardware |
Building |
Building materials |
Periodicals. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910347060403321 |
|
|
Autore |
Labitzke Sebastian |
|
|
Titolo |
Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
KIT Scientific Publishing, 2013 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVIII, 196 p. p.) |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i. |
|
|
|
|
|
|
|
|
|
|
e., enterprise identity management and online social networks. For that, we investigate which pieces of PII can how often be gathered, correlated, or even be inferred by third parties that are not intended to get access to the specific pieces of PII. Furthermore, we introduce technical measures and concepts to avoid unintended flows of PII. |
|
|
|
|
|
| |