Mostrando 29,941 - 29,960 Resultados de 41,870 Para Buscar '"Documental"', tiempo de consulta: 0.20s Limitar resultados
  1. 29941
    Publicado 2021
    Tabla de Contenidos: “…6.5 Keyword arguments -- 6.6 Default argument values -- 6.7 Formatting conventions -- 6.8 Nested functions -- 6.9 Variable scope -- 6.10 Functions are objects -- 6.11 Anonymous functions -- 6.12 Recursion -- 6.13 Summary -- Chapter 7: Organizing Objects into Classes -- 7.1 Objects -- 7.2 Classes, methods, and variables -- 7.3 Object representation -- 7.4 Magic methods -- 7.5 Attributes and properties -- 7.6 Naming conventions and encapsulation -- 7.7 Commenting Python code -- 7.8 Documenting Python code -- 7.9 Enumerations -- 7.10 More polynomial magic -- 7.11 Class variables -- 7.12 Class and static methods -- 7.13 Inheritance -- 7.14 Iterators -- 7.15 Generators -- 7.16 Objects in collections -- 7.17 Creating modules -- 7.18 Summary -- Chapter 8: Working with Files -- 8.1 Paths and the file system -- 8.2 Moving around the file system -- 8.3 Creating and removing directories -- 8.4 Lists of files and folders -- 8.5 Names and locations -- 8.6 Types of files -- 8.7 Reading and writing files -- 8.8 Saving and restoring data -- 8.9 Summary -- Part II: Algorithms and Circuits -- Chapter 9: Understanding Gates and Circuits -- 9.1 The software stack -- 9.2 Boolean operations and bit logic gates -- 9.3 Logic circuits -- 9.4 Simplifying bit expressions -- 9.5 Universality for bit gates -- 9.6 Quantum gates and operations -- 9.7 Quantum circuits -- 9.8 Universality for quantum gates -- 9.9 Summary -- Chapter 10: Optimizing and Testing Your Code -- 10.1 Testing your code -- 10.2 Timing how long your code takes to run -- 10.3 Optimizing your code -- 10.4 Looking for orphan code -- 10.5 Defining and using decorators -- 10.6 Summary -- Chapter 11: Searching for the Quantum Improvement -- 11.1 Classical searching -- 11.2 Quantum searching via Grover -- 11.3 Oracles -- 11.4 Inversion about the mean -- 11.5 Amplitude amplification -- 11.6 Searching over two qubits…”
    Libro electrónico
  2. 29942
    por Gupta, Ambrish
    Publicado 2011
    Tabla de Contenidos: “…Cover -- About the Author -- Contents -- Outstanding Pedagogical Features -- List of Companies Whose Cases and Financial Practices/Information have been Incorporated in this Book -- Preface to the Fourth Edition -- Preface -- Part 1: The Foundation -- Chapter 1: Measurement of Profit and Financial Position: I Business Transactions to Trial Balance -- Introduction -- India - The Place of Origin of Modern Accounting -- The Anatomy of Business -- Assets -- Financial Position -- Income -- Expenses -- Financial Performance -- The Accounting Process -- Documentation and Recording of Business Transactions -- Wonderland of Debit and Credit -- Dual Aspect Concept -- Accrual Concept/Mercantile System of Accounting -- Classifying Business Transactions -- Summarising Business Transactions -- A Comprehensive Case -- Application of Other Fundamental Accounting Concepts -- Realisation Concept -- Money Measurement Concept -- Cost Concept Further Illustrated -- Note on Computerized Accounting System -- Alternative Presentation of Ledger Using Tally -- Specific Daybooks -- Concluding Remarks -- Keywords -- References -- Exercises -- Chapter 2: Measurement of Profit and Financial Position: II Trial Balance to Balance Sheet and Profit and Loss Account: Non-corporate Entities -- Introduction -- Measurement of Business Income and Financial Position -- Trial Balance to Balance Sheet and Profit and Loss Account -- Analysis of Trial Balance -- Need for Adjustments -- Inventory Valuation -- Construction of Balance Sheet and Profit and Loss Account -- General instructions and observations for preparing the two financial statements -- Brief Analysis of the Financial Statements of Bharat Traders -- Recap of Fundamental Accounting Concepts -- Recap of Adjustments -- Concluding Remarks -- Keywords -- Exercises…”
    Libro electrónico
  3. 29943
    Publicado 2017
    Tabla de Contenidos: “…-- Organization of This Book -- Acknowledgments -- A Final Note -- Chapter 1: C# Crash Course -- Choosing an IDE -- A Simple Example -- Introducing Classes and Interfaces -- Creating a Class -- Creating an Interface -- Subclassing from an Abstract Class and Implementing an Interface -- Tying Everything Together with the Main() Method -- Running the Main() Method -- Anonymous Methods -- Assigning a Delegate to a Method -- Updating the Firefighter Class -- Creating Optional Arguments -- Updating the Main() Method -- Running the Updated Main() Method -- Integrating with Native Libraries -- Conclusion -- Chapter 2: Fuzzing and Exploiting XSS and SQL Injection -- Setting Up the Virtual Machine -- Adding a Host-Only Virtual Network -- Creating the Virtual Machine -- Booting the Virtual Machine from the BadStore ISO -- SQL Injections -- Cross-Site Scripting -- Fuzzing GET Requests with a Mutational Fuzzer -- Tainting the Parameters and Testing for Vulnerabilities -- Building the HTTP Requests -- Testing the Fuzzing Code -- Fuzzing POST Requests -- Writing a POST Request Fuzzer -- The Fuzzing Begins -- Fuzzing Parameters -- Fuzzing JSON -- Setting Up the Vulnerable Appliance -- Capturing a Vulnerable JSON Request -- Creating the JSON Fuzzer -- Testing the JSON Fuzzer -- Exploiting SQL Injections -- Performing a UNION-Based Exploit by Hand -- Performing a UNION-Based Exploit Programmatically -- Exploiting Boolean-Blind SQL Vulnerabilities -- Conclusion -- Chapter 3: Fuzzing SOAP Endpoints -- Setting Up the Vulnerable Endpoint -- Parsing the WSDL -- Creating a Class for the WSDL Document -- Writing the Initial Parsing Methods -- Writing a Class for the SOAP Type and Parameters…”
    Libro electrónico
  4. 29944
    Publicado 2023
    Tabla de Contenidos: “…-- The M Language -- Undoing and Redoing a Step -- Naming and Documenting -- Data Quality and Distribution -- Keys and IDs -- Data Types Matter! …”
    Libro electrónico
  5. 29945
    Publicado 2023
    Tabla de Contenidos: “…Risk Treatment and Response -- Risk Mitigation -- Risk Avoidance -- Risk Transference -- Risk Acceptance -- Risk Analysis -- Control Risk -- Risk Reporting -- Enterprise Risk Management -- Assessing Provider Risk Management Practices -- Risk Management Frameworks -- Cloud Contract Design -- Business Requirements -- Vendor Management -- Data Protection -- Negotiating Contracts -- Common Contract Provisions -- Contracting Documents -- Government Cloud Standards -- Common Criteria -- FedRAMP -- FIPS 140-2 -- Manage Communication with Relevant Parties -- Summary -- Exam Essentials -- Review Questions -- Appendix: Answers to the Review Questions -- Chapter 1: Architectural Concepts -- Chapter 2: Data Classification -- Chapter 3: Cloud Data Security -- Chapter 4: Security in the Cloud -- Chapter 5: Cloud Platform, Infrastructure, and Operational Security -- Chapter 6: Cloud Application Security -- Chapter 7: Operations Elements -- Chapter 8: Operations Management -- Chapter 9: Legal and Compliance Issues -- Chapter 10: Cloud Vendor Management -- Index -- Comprehensive Online Learning Environment -- EULA…”
    Libro electrónico
  6. 29946
    Publicado 2018
    Tabla de Contenidos: “…-- Client-side versus server-side APIs -- Client-side APIs -- Server-side APIs -- Where scripting is supported -- Access controls -- Business rules -- Client scripts and catalog client scripts -- Condition builder (and the URL) -- Default value -- Script includes -- UI actions -- UI policies and catalog UI policies -- UI scripts -- Workflow activities -- Integrated development environment -- Script tree -- Script auto-completion -- Script editor macros -- Documentation macro -- For-loop macro -- GlideRecord macros -- Demo -- Summary -- Chapter 9: The Server-Side Glide API -- The structure of an API class -- Server-side APIs -- GlideRecord -- Initialize -- Example usage -- addQuery() -- Available query operators -- Example usage -- addActiveQuery() -- addNullQuery() and addNotNullQuery() -- Example usage -- canRead(), canWrite(), canCreate(), and canDelete() -- Example usage -- deleteRecord() and deleteMultiple() -- Example usage -- get() -- Example usage -- getDisplayValue() -- Example usage…”
    Libro electrónico
  7. 29947
    Publicado 2017
    Tabla de Contenidos: “…Playing the Sounds at the Right Time -- Shooting Sparks -- What You Learned -- Resources -- Troubleshooting Errors -- Apple Documentation -- Xcode Keyboard Shortcuts -- iOS Simulator Keyboard Shortcuts -- Xcode Versions -- Index…”
    Libro electrónico
  8. 29948
    Publicado 2010
    Tabla de Contenidos: “…, ~, ++, --, true, false) -- Conversion Operators -- Guidelines for Conversion Operators -- Referencing Other Assemblies -- Changing the Assembly Target -- Referencing an Assembly -- Encapsulation of Types -- Defining Namespaces -- Namespace Alias Qualifier -- XML Comments -- Associating XML Comments with Programming Constructs -- Generating an XML Documentation File -- Garbage Collection -- Weak References -- Resource Cleanup -- Finalizers -- Deterministic Finalization with the using Statement -- Garbage Collection and Finalization -- Resource Utilization and Finalization Guidelines -- Lazy Initialization -- Summary -- 10 Exception Handling -- Multiple Exception Types -- Catching Exceptions -- General Catch Block -- Guidelines for Exception Handling -- Defining Custom Exceptions -- Summary -- 11 Generics -- C# without Generics -- Introducing Generic Types -- Using a Generic Class -- Defining a Simple Generic Class -- Benefits of Generics -- Type Parameter Naming Guidelines -- Generic Interfaces and Structs -- Defining a Constructor and a Finalizer -- Specifying a Default Value -- Multiple Type Parameters -- Arity in Abundance -- Nested Generic Types -- Constraints -- Interface Constraints -- Base Class Constraints -- struct/class Constraints -- Multiple Constraints -- Constructor Constraints -- Constraint Inheritance -- Generic Methods -- Type Inferencing -- Specifying Constraints -- Covariance and Contravariance -- Enabling Covariance with the out Type Parameter Modifier in C# 4.0 -- Enabling Contravariance with the in Type Parameter Modifier in C# 4.0.…”
    Libro electrónico
  9. 29949
    por Room, Stewart
    Publicado 2021
    Tabla de Contenidos: “…INTRODUCTION TO OPERATIONAL DATA PROTECTION -- Operational adequacy schemes - implementing data protection (operationalisation) -- Focus on operational adequacy schemes -- The three layers of an organisation -- Implementing data protection in the people layer -- Governance structures -- Steering committee -- Recruitment and onboarding -- Education and training -- Access rights and privileges -- Monitoring -- Worker discipline -- Flowing requirements to data processors -- Implementing data protection in the paper layer -- Data Protection by Design and Default (DPbDD, or PbD) -- Governance structures -- Records of processing activities -- Risk registers and assessment tools and methodologies -- Legitimate interests assessments -- Transfer assessments -- Transparency notices -- Contracts and similar documents -- Policies, procedures and controls frameworks -- Records of significant events -- Programme and project plans -- Technology architecture -- Assurance records -- Other mechanisms for assurance -- Implementing data protection in the technology and data layer -- Privacy Enhancing Technologies -- Regulatory sandboxes -- 'The Journey to Code' -- Risk management - implementing measures to assess risks to rights and freedoms and the appropriateness of controls -- The adequacy test -- The impact of the 'consensus of professional opinion' - what are the risks and what should be done about them? …”
    Libro electrónico
  10. 29950
    Publicado 2004
    Tabla de Contenidos: “…Consuming DB2 Web services in .NET -- 9.1 Web services and DB2 -- 9.2 Web Services Object Runtime Framework (WORF) -- 9.2.1 Document access definition extension (DADX) -- 9.2.2 DB2 XML Extender -- 9.2.3 How WORF processes a Web service request -- 9.2.4 Setting up a WORF environment for Windows -- 9.2.5 Creating and deploying DB2 WORF service -- 9.3 Consuming the DADX Web service using .NET client -- Chapter 10. …”
    Libro electrónico
  11. 29951
    por Kroah-Hartman, Greg
    Publicado 2007
    Tabla de Contenidos: “…ACPI Options -- acpi -- acpi_sleep -- acpi_sci -- acpi_irq_ balance -- acpi_irq_ nobalance -- acpi_irq_isa -- acpi_irq_pci -- acpi_os_name -- acpi_osi -- acpi_serialize -- acpi_skip_ timer_override -- acpi_dbg_layer -- acpi_fake_ecdt -- acpi_generic_ hotkey -- acpi_pm_good -- ec_intr -- memmap -- memmap -- pnpacpi -- processor.max_ cstate -- processor.nocst -- SCSI Options -- max_luns -- max_report_ luns -- scsi_dev_flags -- PCI Options -- PCI -- Plug and Play BIOS Options -- noisapnp -- pnpbios -- pnp_reserve_ irq -- pnp_reserve_ dma -- pnp_reserve_io -- pnp_reserve_ mem -- SELinux Options -- checkreqprot -- enforcing -- selinux -- selinux_ compat_net -- Network Options -- netdev -- rhash_entries -- shapers -- thash_entries -- Network File System Options -- lockd.nlm_ grace_period -- lockd.nlm_ tcpport -- lockd.nlm_ timeout -- lockd.nlm_ udpport -- nfsroot -- nfs.callback_ tcpport -- nfs.idmap_ cache_timeout -- Hardware-Specific Options -- nousb -- lp -- parport -- parport_init_ mode -- nr_uarts -- Timer-Specific Options -- enable_timer_ pin_1 -- disable_timer_ pin_1 -- enable_8254_ timer -- disable_8254_ timer -- hpet -- clocksource -- Miscellaneous Options -- dhash_entries -- elevator -- hashdist -- combined_ mode -- max_loop -- panic -- pause_on_oops -- profile -- Kernel Build Command-Line Reference -- Informational Targets -- Cleaning Targets -- Configuration Targets -- Build Targets -- Packaging Targets -- Documentation Targets -- Architecture-Specific Targets -- Analysis Targets -- Kernel Configuration Option Reference -- EXPERIMENTAL -- LOCALVERSION -- AUDIT -- IKCONFIG -- EMBEDDED -- MODULES -- IOSCHED_NOOP -- IOSCHED_AS -- IOSCHED_ DEADLINE -- IOSCHED_CFQ -- SMP -- M386 -- X86_GENERIC -- NR_CPUS -- SCHED_SMT -- PREEMPT_NONE -- PREEMPT_ VOLUNTARY -- PREEMPT -- PREEMPT_BKL -- NOHIGHMEM -- HIGHMEM4G -- HIGHMEM64G -- FLATMEM_ MANUAL…”
    Libro electrónico
  12. 29952
    Publicado 2005
    Tabla de Contenidos: “…Development tips for portable applications -- End-to-end life cycle -- Software development life cycle key concepts -- The Rational Unified Process -- General development best practices -- Iterative development -- Requirements definition -- Object Oriented (OO) approach to design and programming -- Modeling languages -- Regular reviews and check points -- Java development best practices -- Code documentation -- Unit testing -- Automation -- Enterprise Java development best practices -- Modularization -- Follow the standards -- Design patterns -- J2EE best practices -- Appendix B. …”
    Libro electrónico
  13. 29953
    Publicado 2013
    Tabla de Contenidos: “…Tools for Performance Measurement -- Tests for Statistical Assumptions -- Tests for Business Assumptions -- Intervals and Regions -- DoS (Design of Samples) -- DoE (Design of Experiments) -- Section 8.2 Juxtaposition by Method -- Paired Statistical Models -- Section 8.3 Data Splitting -- Coping with Hazards -- K-Fold Cross-Validation -- Sequential Validation (with Three or More Splits) -- Notes -- 9 Statistical Review-Act V -- Élan -- Qualifi cations and Roles of Reviewers -- Statistical Malpractice -- Section 9.1 Purpose and Scope of the Review -- Purpose -- Scope -- Context -- Section 9.2 Reviewing Analytics-Based Decision Making-Acts I to IV -- Reviewing Qualifi cations of Analytics Professionals-Checking the Q in QDR -- Restrictions Imposed on the Analysis -- Appropriate and Reliable Data -- Analytics Software -- Reasonableness of Data Analysis Methodology -- Reasonableness of Data Analysis Implementation -- Statistical Diagnostics-Checking the D in QDR -- Interpreting the Results (Transformation Back), Act III -- Reviewing Analytics-Based Decision Making, Act IV -- Closing Considerations-Documentation, Maintenance, Recommendations, and Rejoinder -- Notes -- Part III Building Blocks for Supporting Analytics -- 10 Data Collection -- Randomization -- Interval and Point Estimation -- Return on Data Investment -- Measuring Information -- Measurement Error12 -- Section 10.1 Observational and Censual Data (No Design) -- Section 10.2 Methodology for Anecdotal Sampling -- Expert Choice -- Quota Samples -- Dewey Defeats Truman -- Focus Groups14 -- Section 10.3 DoS (Design of Samples -- Sample Design -- Simple Random Sampling -- Systematic Sampling -- Advanced Sample Designs -- The Nonresponse Problem -- Post-Stratifying on Nonresponse -- Panels, Not to Be Confused with Focus Groups -- Section 10.4 DoE (Design of Experiments) -- Experimental Design…”
    Libro electrónico
  14. 29954
    por Guthrie, Forbes
    Publicado 2013
    Tabla de Contenidos: “…-- The Facets of vSphere Design -- The Technical Facet -- The Organizational Facet -- The Operational Facet -- The Principles of Design -- Availability -- Manageability -- Performance -- Recoverability -- Security -- The Process of Design -- Gathering and Defining Functional Requirements -- Assessing the Environment -- Performing a Gap Analysis -- Assembling the Design -- Documenting the Design -- Performing the Implementation -- Summary -- Chapter 2 The ESXi Hypervisor -- Evolution of the vSphere Hypervisor -- The ESXi Concept -- ESXi Design -- ESXi Components -- ESXi Agents -- ESXi System Image -- ESXi Customized Images -- ESXi Disk Layout -- Tardisks and Ramdisks -- ESXi Deployment -- Hardware Requirements -- ESXi Flavors: Installable, Embedded, and Stateless -- Auto Deploy Infrastructure -- Comparing Deployments Options -- Upgrading ESXi -- Migrating from ESX -- Testing -- Deployment -- Management -- Postinstallation Design Options -- Management Tools Overview -- Host-Management Tools -- Centralized Management Tools -- Hardware Monitoring -- Logging -- Summary -- Chapter 3 The Management Layer -- Reviewing the Components of the Management Layer -- VMware vCenter Server -- vSphere Client and vSphere Web Client -- vSphere Update Manager -- Management Applications -- Examining Key Management Layer Design Decisions -- Virtual or Physical vCenter Server? …”
    Libro electrónico
  15. 29955
    Publicado 2017
    Tabla de Contenidos: “…Committing the changes in Git -- Undoing the changes -- Branches -- Merging codes -- The mergetool command -- The pull command -- Using venv to create a stable and isolated work area -- Creating a virtual environment -- Activating a virtual environment -- pip in virtual environments -- Getting the most out of docstrings -- PEP 257 and docutils -- Sphinx -- Turning docstrings into HTML -- Using doctest to test documentation examples -- Testing examples using doctest -- What it means when a code example fails -- Summary -- Chapter 5: Making a Command-Line Utility -- Making a package executable via Python -m -- Pipeline program -- Handling command-line arguments with argparse -- Creating an ArgumentParser object -- Setting the name of argument -- nargs -- Python tools to interact with the user -- Python's built-in functions - print and input -- The getpass package -- The pprint package -- The cmd class -- The Pipeline user interface -- Executing other programs with subprocess -- Subprocess and its variants -- Using the Popen subprocess -- The PIPE constant -- The wait method -- Finishing up our code example -- Setting up a shell script or batch file to launch the program -- Creating launches for our program -- Summary -- Chapter 6: Parallel Processing -- Using the concurrent.futures package -- The concurrent.futures module -- Calling ProcessPoolExecutor -- Using the map method -- Using the submit method -- The done and result methods -- The wait and as_completed functions -- The add done callback function -- The cancel method -- Using the multiprocessing packages -- Process class in the multiprocessing module -- Queues -- Pipes -- Manager -- The lock object -- The event object -- The condition object -- The semaphore object -- Summary -- Chapter 7: Coroutines and Asynchronous I/O -- The difference between asynchronous processing and parallel processing…”
    Libro electrónico
  16. 29956
    Publicado 2017
    Tabla de Contenidos: “…. -- How it works... -- Analyzing documents using tf-idf -- How to do it... -- How it works... -- Performing sentiment prediction using LSTM network -- How to do it... -- How it works... -- Application using text2vec examples -- How to do it... -- How it works... -- Chapter 9: Application of Deep Learning to Signal processing -- Introducing and preprocessing music MIDI files -- Getting ready -- How to do it... -- Building an RBM model -- Getting ready -- How to do it... -- Generating new music notes -- How to do it... -- Chapter 10: Transfer Learning -- Introduction…”
    Libro electrónico
  17. 29957
    Publicado 2018
    Tabla de Contenidos: “…Hardening server security -- Check for open ports or services -- System firewall configuration -- System update -- Disable USB -- Hard disk encryption -- BIOS protection -- Check the installed packages -- Password policies -- Secure and encrypt remote access -- Implement activity logging -- Document the host information -- Authentication NTLM versus Kerberos -- Password policies -- Server-level permissions -- Server antivirus and malware protection -- Local security policies -- Summary -- Questions -- Further reading -- Chapter 4: Cloud Security Design -- Cloud offerings -- IaaS -- PaaS -- SaaS -- Public versus private -- Public IaaS versus private IaaS -- Public PaaS versus private PaaS -- Public SaaS versus private SaaS -- Shared technology and shared danger -- Security approach for cloud computing -- Traditional enterprise network model -- Hybrid data center and cloud network -- Network security devices for IaaS -- Firewall Virtual Appliance -- Virtual TAP vTAP -- Virtual Router -- Virtual web application firewalls -- DDoS attack protection -- Data loss prevention -- Exploited system vulnerabilities -- Summary -- Questions -- Further reading -- Chapter 5: Application Security Design -- GDPR -- Getting consent -- Access to data -- Encryption -- SQL Injection -- Prevention of SQL Injection attack on web applications -- Employing comprehensive data sanitization -- Deploying a Web Application Firewall -- Limit database privileges -- Finding vulnerabilities -- WAFs -- WAF protection against common web attacks -- Blacklisting and whitelisting -- What is blacklisting? …”
    Libro electrónico
  18. 29958
    Publicado 2011
    Tabla de Contenidos: “…The MINDSTORMS Method -- Hitting the Target with the MINDSTORMS Method -- Step 1: Getting an Idea for a Robot -- Step 2: Building the Robot -- Step 3: Programming the Robot -- Step 4: Documenting the Robot -- Conclusion -- 11. Inventor-Bot: A Vehicle with Treads -- Building Inventor-Bot -- Connecting the Cables -- Programming Inventor-Bot -- Driving Straight and Turning -- Making the Robot Interactive -- Conclusion -- 12. …”
    Libro electrónico
  19. 29959
    Publicado 2011
    Tabla de Contenidos: “…for Education -- Basic Planning of Educational Sites -- Extensions to Consider for Education -- JCE -- Simple Image Rotator -- Filtered News -- Displaying Documents -- Calendars -- Contact Information and Staff Pages -- Additional Tools -- LDAP Authentication -- Bulk Import of Users -- ProjectFork -- Access Management -- Accessibility -- Accessible Template Design -- Multilingual Sites -- Learning Extensions -- Blogging Applications -- Social Networking Sites -- School Web Site Demo -- JCE -- Community Builder -- Community Builder Profile Pages -- Community Builder Lists -- Community Builder Plugins -- More on Navigation -- Calendars -- Template Customization -- Conclusion -- 11 A Look at Joomla! …”
    Libro electrónico
  20. 29960
    Publicado 2010
    Tabla de Contenidos: “…Searching for Transactions -- 4 Invoicing and Collecting Income -- Setting Customers Preferences -- Creating an Invoice -- Previewing or Printing Invoices -- Emailing an Invoice -- Charging Expenses to a Customer -- Setting Finance Charge Preferences -- Creating a Monthly Statement -- Receiving Payments for Invoices -- Issuing a Credit or Refund -- Recording Cash Sales (COD) -- Making Bank Deposits -- Receiving Advances, Retainers, and Down Payments -- Issuing Discounts -- Tracking Accounts Receivable -- Viewing the Open Invoices Report -- Creating a Collection Letter -- Recording Bad Debts -- Working with Multiple Currencies -- 5 Making Purchases and Recording Payments -- Setting Purchases and Vendors Preferences -- Working with the Vendor Center -- Using Purchase Documents -- Reporting on Open Purchase Orders -- Receiving Goods -- Receiving a Partial Order -- Viewing Aging and Unpaid Bills Reports -- Paying Bills -- Taking Discounts -- Using the Check Register -- Editing Bill Payments -- Deleting Bill Payments -- Setting Checking Preferences -- Writing Checks -- Printing Checks -- Voiding Checks -- 6 Collecting and Paying Sales Tax -- Setting Sales Tax Preferences -- Creating a Sales Tax Item -- Creating a Sales Tax Group -- Charging Sales Tax to Customers -- Entering Tax Status of Inventory Items -- Selling Tax-Exempt Items -- Selling Items to Tax-Exempt Customers -- Producing Monthly Sales Tax Reports -- Paying Sales Tax -- Taking a Discount for Early Payment -- 7 Using Time-Saving Features -- Memorizing Transactions -- Memorizing a Group of Transactions -- Using Memorized Transactions -- Scheduling Recurring Transactions -- Changing Memorized and Scheduled Transactions -- Removing Memorized Transactions -- Setting Reminders Preferences -- Using Reminders -- 8 Job Cost Estimating and Tracking -- Setting Jobs and Estimate Preferences…”
    Libro electrónico