Mostrando 35,721 - 35,740 Resultados de 41,745 Para Buscar '"Documental"', tiempo de consulta: 0.15s Limitar resultados
  1. 35721
    por Livingston, Dan
    Publicado 2003
    “…Advanced JavaScript, Insights and Innovative Techniques covers: Hierarchical menus: arrays, main functions, and behaviors FolderTree: complex hierarchical tree views of folders and documents Using regular expressions to extract data and replace text Using JavaScript to import and read XML Calling JavaScript from Flash movies Stylesheets, DHTML, and the Document Object Model (DOM) Mouseovers: image replacement, rollover functions, preloading, submenus, and more Dropdown menus, including navigation and altering menu content Form elements: text fields, checkboxes, radio buttons, and text areas Validating user data, credit card numbers, and other form input Dynamic table configurations: from basic report making to advanced techniques News scrollers, layer sliders, and other advanced applications Cookies, list manipulation, communicating among frames, swapping image maps, and much more…”
    Libro electrónico
  2. 35722
    Publicado 2010
    “…He begins by creating the project using Xcode and designing and building the user interface with Interface Builder, and then he fills in the details expected of any working application, such as managing documents and windows, setting up the main menu, and configuring controls. …”
    Libro electrónico
  3. 35723
    por Knittel, Brian
    Publicado 2003
    “…Although Microsoft provides the tools, users are hard pressed to find much-if any-documentation on these tools. Rather than learning by osmosis, we suggest that you pick up a copy of this indispensable book…”
    Libro electrónico
  4. 35724
    por Manoel, Edson
    Publicado 2005
    “…This book is a valuable addition to the existing products documentation and should be read in conjunction with the official products documentation, which complements some of the concepts explained in this book. …”
    Libro electrónico
  5. 35725
    por Patrick, Tim, 1966-
    Publicado 2000
    “…In the field of software development, this means using consistent, documented conventions that can be easily understood and built upon by teammates, now and in the future. …”
    Libro electrónico
  6. 35726
    Publicado 2008
    “…Acrobat 9 Pro also offers users a dramatically overhauled form creation tool; a streamlined, interactive document review process; synchronized document views; powerful redaction tools, and more.Acrobat Pro Extended (formerly Adobe Acrobat 3D Version 8) offers Windows users added functionality, such as new 3D capabilities, PDF mapping features, video conversion tools, native support for Flash technology (so users can include video, animations, and applications in Acrobat and Acrobat Reader PDF files), and Adobe Presenter, which lets users create interactive presentations with PowerPoint and then publish them to PDF…”
    Libro electrónico
  7. 35727
    Publicado 2019
    “…Business communication expert and bestselling author Dianna Booher shares practical wisdom on how to write effective emails that get results and how to organize documents to gain control and increase your productivity. …”
    Libro electrónico
  8. 35728
    Publicado 2019
    “…You'll find the most current, real-world advice on customizing an LLC for your specific business needs, creating a great operating agreement, keeping accurate records, and new information on federal regulations and fees that are applicable to LLCs, as well as a link to online tools, forms, and documents Most of the previous drawbacks to forming an LLC have all but disappeared with the IRS having loosened restrictions and individual states following suit. …”
    Libro electrónico
  9. 35729
    Publicado 2020
    “…The target audience for this document is system programmers who are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. …”
    Libro electrónico
  10. 35730
    Publicado 2014
    “…Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, touch, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner that scales from small tablets to large TVs. …”
    Libro electrónico
  11. 35731
    Publicado 2013
    “…These tasks include: review of program plans development of the formal test plan creation of test documentation (test design, test cases, test software, and test procedures) acquisition of automated testing tools test execution updating the test documentation tailoring the model for projects of all sizes Whether you are an experienced test engineer looking for ways to improve your testing process, a new test engineer hoping to learn how to perform a good testing process, a newly assigned test manager or team leader who needs to learn more about testing, or a process improvement leader, this book will help you maximize your effectiveness…”
    Libro electrónico
  12. 35732
    Publicado 2002
    “…Segment essentiel de la documentation universitaire, les revues sont entrées depuis quelques années déjà dans le nouveau monde numérique. …”
    Libro electrónico
  13. 35733
    “…These policy recommendations have been presented in several WHO documents and their associated annexes, including the WHO treatment guidelines for multidrug- and rifampicin-resistant tuberculosis, 2018 update, issued by WHO in December 2018. …”
    Libro electrónico
  14. 35734
    por World Health Organization
    Publicado 2019
    “…These policy recommendations have been presented in several WHO documents and their associated annexes, including the WHO treatment guidelines for multidrug- and rifampicin-resistant tuberculosis, 2018 update, issued by WHO in December 2018. …”
    Libro electrónico
  15. 35735
    Publicado 2016
    “…Standard foam hospital mattresses are seldom described. The documentation identified is not sufficient for guiding a choice between various foam mattresses. …”
    Libro electrónico
  16. 35736
    Publicado 2007
    “…Few studies were controlled and no RCTs were identified. These studies documented results from 182 IVM children. Two studies had follow-up data, but no studies had followed the children more than two years. …”
    Libro electrónico
  17. 35737
    por Giovannini, Adalberto, 1940-
    Publicado 2015
    “…Pour ce qui est des derniers temps de la République, la mise au jour d’inscriptions et d’autres documents permet de mieux comprendre la transition des commandements extraordinaires de la fin de la République au principat instauré par Auguste. …”
    Libro
  18. 35738
    Publicado 2010
    Materias: “…Documentales…”
    Ver más información
    DVD
  19. 35739
    Publicado 2020
    Tabla de Contenidos: “…Schwinghammer oChapter 1: Introduction: How to Use This Casebook oChapter 2: Active Learning Strategies oChapter 3: Patient Communication: Getting the Most Out of That One-on-One Time oChapter 4: The Patient Care Plan oChapter 5: Documentation of Pharmacist Encounters and Interventions oChapter 6: Pediatrics: Children Are Not Just Little Adults Level III oChapter 7: Geriatrics: Falling Frannie Level II oChapter 8: Palliative Care: Helpful Hospice Level III oChapter 9: Clinical Toxicology: Acetaminophen Toxicity: If One Is Good, More Is Better Level II oChapter 10: Cyanide Exposure: Expect the Unexpected Level II oChapter 11: Chemical Threat Agent Exposure: Name That Poison Level II *Section 2: Cardiovascular Disorders Section Editor: Julia M. …”
    Libro electrónico
  20. 35740
    Publicado 2017
    Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
    Libro electrónico