Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Engineering & Applied Sciences 1,786
- Development 1,530
- Management 1,362
- Application software 1,271
- Historia 1,204
- Computer Science 1,183
- History 979
- Science: general issues 931
- Computer networks 856
- Computer programs 763
- Data processing 696
- Examinations 666
- Design 659
- Business & Economics 655
- Security measures 600
- Leadership 583
- Medicine 582
- Computer security 567
- Web site development 561
- Computer programming 557
- Photography 557
- Web sites 548
- Electrical & Computer Engineering 545
- Operating systems (Computers) 541
- Cloud computing 524
- Computer software 516
- Programming 515
- Certification 504
- Database management 503
- Python (Computer program language) 497
-
48001por Canadian Agency for Drugs and Technologies in Health“…By the end of the model, pregnancy was considered terminated in all patients regardless of the initial abortion strategy. …”
Publicado 2017
Libro electrónico -
48002Publicado 1997“…., using a database) Networking Graphical interfaces, using the Tk toolkit Interaction with C language functions Embedding and extending the Perl interpreter In addition, the book patiently explains all sorts of language details you've always wanted to know more about, such as the use of references, trapping errors through the eval operator, non-blocking I/O, when closures are helpful, and using ties to trigger actions when data is accessed. …”
Libro electrónico -
48003Publicado 2006“…Readers will Learn to create, rename, update, and delete objects in Active Directory and ADAM Learn to bind to and search directories effectively and efficiently Learn to read and write attributes of all types in the directory Learn to use directory services within ASP.NET applications Get concrete examples of common programming tasks such as managing Active Directory and ADAM users and groups, and performing authentication Experienced .NET developers—those building enterprise applications or simply interested in learning about directory services—will find that The .NET Developer’s Guide to Directory Services Programming unravels the complexities and helps them to avoid the common pitfalls that developers face…”
Libro electrónico -
48004Publicado 2005“…. © Copyright Pearson Education. All rights reserved…”
Libro electrónico -
48005por Gagné, Marcel“…, and MSN Make free calls anywhere on Earth, with Skype Create podcasts (and more) with Audacity . . . or download podcasts with Juice Build your own Web site with NVU Create and edit digital art with Inkscape and The GIMP Protect your Windows computer with Spybot and ClamWin Discover great free games, including Flightgear, the better flight simulator There's more--from handy utilities like CD Ripper to pro-quality desktop publishing software for all your newsletters and brochures. This book gives you software the way it's supposed to be--powerful, friendly, and free!…”
Publicado 2007
Libro electrónico -
48006Publicado 2007“…Then follow practical chapters on Core, BOM, Events, DOM, CSS Modification, and Data Retrieval, all of which are explained through a combination of theoretical instruction and the taking apart of the relevant sections of the example scripts…”
Libro electrónico -
48007Publicado 2003“…The diverse solutions presented here will prove invaluable over and over again, for ADO.NET programmers at all levels, from the relatively inexperienced to the most sophisticated…”
Libro electrónico -
48008Publicado 2002“…Bob's real-life examples and humor make the book approachable and practical for all professionals involved in the creation of web applications." …”
Libro electrónico -
48009Publicado 2008“…Learn how to diagnose and manage the often unconscious shared beliefs that constitute your company’s soul...how to face the enormous identity challenges that arise in mergers, alliances, spin-offs, and the creation of new brands...and above all, how to lead and inspire in this new Age of Identity. • Master your company’s “I*Dimension” New tools for leveraging identity for competitive advantage • Manage the tensions that shape your company’s identity Convergent vs. divergent, internal vs. external, designed vs. emergent, sameness vs. uniqueness • Overcome the dark, dysfunctional side of identity Minimize narcissism, conflict, drift, and fragmentation • Protect what’s precious, change what needs to change Managing identity through M&As, spin-offs, alliances, and unrelenting change…”
Libro electrónico -
48010Publicado 2003“…You will find out where all your storage is going and be able to act intelligently on this information. …”
Libro electrónico -
48011por Raza, Khalid“…Router configuration examples, network case studies, and sample scenarios all help you put the book's information to use and become an effective Cisco Certified Internetwork Expert (CCIE). …”
Publicado 2000
Libro electrónico -
48012por Castets, Gustavo“…This book is a tape product selection and differentiation guide that is designed to assist users in finding all the information needed to select the best tape solution for the designated backup environment. …”
Publicado 2004
Libro electrónico -
48013Publicado 2005“…Along with tips, sidebars, and expert commentary, there are also numerous illustrations and screen shots included to offer readers the most complete coverage on this extraordinary application. Designers from all fields--illustrators, animators, package designers, graphic designers, web designers, and more--will find Real World Adobe Illustrator CS2 their one-stop guide to creating powerful designs in Illustrator CS2. …”
Libro electrónico -
48014Publicado 1996“…Rarely documented C programming tricks-of-the-trade. Convenient access to all source code in the book via the World Wide Web at http://www.cs.princeton.edu/software/cii…”
Libro electrónico -
48015Publicado 2002“…A company wants to set up a Web site to sell to customers from all over the world. Studies also have shown that users are much more likely to purchase from a Web site in their own language. …”
Libro electrónico -
48016por Melomed, Edward“…Here's what you will find inside: Understand the key concepts of multidimensional modeling Explore the multidimensional object model and its definition language Learn the main concepts of the MDX language and gain an in-depth understanding of advanced MDX concepts Understand the mechanisms of integrating multidimensional and relational databases Learn how to build client applications to access data in Analysis Services Examine server architecture, including main data structures, data processing, and query resolution algorithms Gain a deep understanding of the internal and external protocols for data transfer, including the XML/A protocol Explore how Analysis Services manages memory Explore the security model, including role-based security, code-access security, and data security Discover how to monitor and manage Analysis Services All the code for the sample database used in the book can be found at www.informit.com/title/0672327821…”
Publicado 2007
Libro electrónico -
48017por White, Russ“…Coverage includes: A historical perspective on OSI protocols and addressing Neighbor discovery, relationships, and pseudonodes Flooding mechanisms, timers, and tuner timing The division of the routing domain Hierarchical network design and IS-IS deployment The interaction between IS-IS and MPLS Protocol enhancements, including dynamic host names, back door links, interaction with RPR, non-stop forwarding, and multitopology routing Examining the IS-IS protocol from its origins to the most recent innovations, this book covers all of the protocol's pieces, packets, deployment strategies, and issues. …”
Publicado 2003
Libro electrónico -
48018Publicado 2003“…Coverage includes: New, in-depth deployment guidance: policy definition, representation, distribution, and management New IPSec enhancements: compression, multicast, key recovery, L2TP support, PKI integration, and more IPSec architecture and components: payloads, headers, Internet Key Exchange, security associations, and more Implementation architecture and techniques, including overlapping and shared security associations, nested and chained tunnels, and more IPSec security in host-to-host, host-to-gateway, and gateway-to-gateway scenarios Establishing secure VPN tunneling A detailed look inside the IPSec kernel IPSec, Second Edition delivers the techniques and insight you need to protect all your digital assets, wherever they are—on the Internet, your intranet, your extranet, or your VPN. …”
Libro electrónico -
48019Publicado 2006“…In addition, this book contains well separated, subjective material (opinion sidebars), comic illustrations, tips and tricks, all of which provide real-world and practical perspectives on relevant topics. …”
Libro electrónico -
48020Publicado 2009“…Determine who will be drawn to your site, why they'll stay, and who they'll interact with Create visual design that clearly communicates how your site works Build the software you need versus plugging in one-size-fits-all, off-the-shelf apps Manage the identities of your visitors and determine how to support their interaction Monitor demand from the community to guide your choice of new functions Plan the launch of your site and get the message out…”
Libro electrónico