Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,220
- Història 1,561
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 570
- Mapes 494
- Fonts 481
- Application software 475
- Documents pontificis 414
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 298
- Data processing 295
- Fonts històriques 281
- Color 277
- Crítica e interpretación 277
- Documentos 269
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
24001
-
24002
-
24003por Palma Rodríguez, Fermín
Publicado 1989Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad de Navarra, Biblioteca del Seminario Diocesano de Jaén)Libro -
24004
-
24005
-
24006
-
24007
-
24008
-
24009
-
24010Publicado 2009Materias:Disco de vídeo
-
24011
-
24012Publicado 2011Libro
-
24013
-
24014
-
24015
-
24016
-
24017
-
24018por McFedries, PaulTabla de Contenidos: “…View Running Applications with Mission ControlTour an Application Window; Run an Application Full Screen; Select a Command from a Pull-Down Menu; Select a Command Using a Toolbar; Select Options with Dialog Controls; Chapter 3: Learning Basic OS X Document Tasks; Save a Document; Open a Document; Print a Document; Edit Document Text; Copy a File; Move a File; Rename a File; Delete a File; Chapter 4: Browsing the World Wide Web; Open and Close Safari; Select a Link; Enter a Web Page Address; Open a Web Page in a Tab; Navigate Web Pages; Navigate with the History List; Change Your Home Page…”
Publicado 2012
Libro electrónico -
24019Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Preface: Maybe It's Time We Get Back to the Basics Anti-Fraud Program Design for the Small Business "Small Business" Defined The Anti-Fraud Program Structure Acknowledgments Part I: The Anti-Fraud Environment: The Blueprints, The Foundation, The Ground Floor Chapter 1: The Architect's Blueprint: Establishing the Framework The Elements of Anti-Fraud Program Design Anti-Fraud Environment Fraud Risk Assessment Control Activities Information: Program Documentation Communication: The Company Fraud Training Program Monitoring and Routine Maintenance Chapter 2: Foundational Policies: The Fraud Policy Foundational Policies The Fraud Policy: The Essential Elements of an Effective Fraud Policy Case Presentation Chapter 3: Foundational Policies: The Fraud Reporting Policy The Essential Elements of an Effective Fraud Reporting Policy Chapter 4: Foundational Policies: The Expense Reimbursement Policy Case: "No Questions Asked" Case: "It Will Never Be Missed" Case: Larry the Chief Financial Officer The Elements of an Effective Expense Reimbursement Policy Appendix 4A: Expense Report Form Appendix 4B: Supplemental Business Meal and Entertainment Charges Form Chapter 5: The Ground Floor: The Fraud Risk Assessment Process Ground Rules for Fraud Risk Assessment An Example of Risk Assessment Procedural Steps for Performing a Fraud Risk Assessment Cash in Bank Case: The Trail is Gone Case: Friends in Low Places Asset Misappropriation Corruption Financial Statement Fraud Section II: Anti-Fraud Control Activities: Raising the Walls Chapter 6: Control Activities: The Absolutes Critical Principles of Control Activity Design Foundational Control Activities Case: The Mail Drop in Las Vegas Appendix 6A: Conflict of Interest Form Appendix 6B: New Vendor Establishment Form Chapter 7: Control Activities: The Segregation of Duties Dilemma But I Only Have Two Employees Prevention verses Detection Controls The Necessary Review Processes Chapter 8: Control Activities: General Processes Two Operational Questions Common Control Activities Case: The Cell Phone Reimbursement Chapter 9: Control Activities: Specific Control Areas Financial Statement Line Item Control Activities Section III: Completing the Anti-Fraud Program: The Ceiling, the Roof, and Routine Maintenance Chapter 10: The Ceiling: Documenting the Anti-Fraud Program Information Documentation - Keeping it Simple The Elements of Quality Documentation Chapter 11: The Ceiling: The Company Fraud Training Program The Elements of Effective Communication The Company Fraud Training Program Chapter 12: The Roof: Monitoring and Routine Maintenance Monitoring and Routine Maintenance Defined The Monitoring and Routine Maintenance Structure Chapter 13: The Sample Anti-Fraud Program Appendix 13A: Fraud Risk Assessment Framework Form Appendix 13B: Control Activities Form Appendix 13C: Documentation of Control Activities Appendix 13D: Compliance Audit Programs and Related Compliance Audit Working Papers Section IV: Appendices Appendix A: The Fraud Policy Sample Fraud Policy Sample Fraud Policy Sample Fraud Policy Appendix B: The Fraud Reporting Policy Sample Fraud Reporting Policy Sample Fraud Reporting Policy Appendix C: The Expense Reimbursement Policy Sample Expense Reimbursement Policy Sample Expense Reimbursement Policy Appendix D: Fraud Risk Assessment Framework Form Appendix E: Control Activities Documentation Form Appendix F: New Vendor Establishment Form Appendix G: Compliance Audit Program Appendix H: Compliance Audit Working Paper Appendix I: Conflict of Interest Form About the Author Index …”
Libro electrónico -
24020por McFedries, Paul L.Tabla de Contenidos: “…Copy Tracks from a Music CD Create a Playlist; Burn Music Files to a CD; Chapter 9: Creating and Editing Documents; Understanding Documents; Create a Document; Save a Document; Open a Document; Edit Document Text; Change the Text Font; Find Text; Replace Text; Chapter 10: Working with Files; View Your Files; Select a File; Change the File View; Preview a File; Copy a File; Move a File; Rename a File; Create a New File; Delete a File; Restore a Deleted File; Chapter 11: Implementing Security; Understanding Windows 8 Security; Check Action Center for Security Problems; Display User Accounts…”
Publicado 2012
Libro electrónico