Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 2,231
- Història 1,562
- Universidad Pontificia de Salamanca (España) 1,505
- Documentales 1,157
- Engineering & Applied Sciences 827
- History 658
- Development 588
- Computer Science 583
- Església Catòlica 573
- Mapes 494
- Fonts 482
- Application software 475
- Documents pontificis 415
- Management 404
- Computer programs 359
- HTML (Document markup language) 354
- Design 352
- Web sites 336
- Web site development 318
- Iglesia Católica 297
- Data processing 295
- Fonts històriques 283
- Color 277
- Crítica e interpretación 277
- Documentos 264
- Universidad Pontificia de Salamanca, Facultad de Educación 241
- Política y gobierno 227
- Business & Economics 226
- Computer networks 226
- Operating systems (Computers) 220
-
35721por Livingston, Dan“…Advanced JavaScript, Insights and Innovative Techniques covers: Hierarchical menus: arrays, main functions, and behaviors FolderTree: complex hierarchical tree views of folders and documents Using regular expressions to extract data and replace text Using JavaScript to import and read XML Calling JavaScript from Flash movies Stylesheets, DHTML, and the Document Object Model (DOM) Mouseovers: image replacement, rollover functions, preloading, submenus, and more Dropdown menus, including navigation and altering menu content Form elements: text fields, checkboxes, radio buttons, and text areas Validating user data, credit card numbers, and other form input Dynamic table configurations: from basic report making to advanced techniques News scrollers, layer sliders, and other advanced applications Cookies, list manipulation, communicating among frames, swapping image maps, and much more…”
Publicado 2003
Libro electrónico -
35722Publicado 2010“…He begins by creating the project using Xcode and designing and building the user interface with Interface Builder, and then he fills in the details expected of any working application, such as managing documents and windows, setting up the main menu, and configuring controls. …”
Libro electrónico -
35723por Knittel, Brian“…Although Microsoft provides the tools, users are hard pressed to find much-if any-documentation on these tools. Rather than learning by osmosis, we suggest that you pick up a copy of this indispensable book…”
Publicado 2003
Libro electrónico -
35724por Manoel, Edson“…This book is a valuable addition to the existing products documentation and should be read in conjunction with the official products documentation, which complements some of the concepts explained in this book. …”
Publicado 2005
Libro electrónico -
35725por Patrick, Tim, 1966-“…In the field of software development, this means using consistent, documented conventions that can be easily understood and built upon by teammates, now and in the future. …”
Publicado 2000
Libro electrónico -
35726Publicado 2008“…Acrobat 9 Pro also offers users a dramatically overhauled form creation tool; a streamlined, interactive document review process; synchronized document views; powerful redaction tools, and more.Acrobat Pro Extended (formerly Adobe Acrobat 3D Version 8) offers Windows users added functionality, such as new 3D capabilities, PDF mapping features, video conversion tools, native support for Flash technology (so users can include video, animations, and applications in Acrobat and Acrobat Reader PDF files), and Adobe Presenter, which lets users create interactive presentations with PowerPoint and then publish them to PDF…”
Libro electrónico -
35727Publicado 2019“…Business communication expert and bestselling author Dianna Booher shares practical wisdom on how to write effective emails that get results and how to organize documents to gain control and increase your productivity. …”
Libro electrónico -
35728Publicado 2019“…You'll find the most current, real-world advice on customizing an LLC for your specific business needs, creating a great operating agreement, keeping accurate records, and new information on federal regulations and fees that are applicable to LLCs, as well as a link to online tools, forms, and documents Most of the previous drawbacks to forming an LLC have all but disappeared with the IRS having loosened restrictions and individual states following suit. …”
Libro electrónico -
35729Publicado 2020“…The target audience for this document is system programmers who are responsible for designing, creating, and maintaining IBM Parallel Sysplex® environments. …”
Libro electrónico -
35730Publicado 2014“…Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, touch, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner that scales from small tablets to large TVs. …”
Libro electrónico -
35731Publicado 2013“…These tasks include: review of program plans development of the formal test plan creation of test documentation (test design, test cases, test software, and test procedures) acquisition of automated testing tools test execution updating the test documentation tailoring the model for projects of all sizes Whether you are an experienced test engineer looking for ways to improve your testing process, a new test engineer hoping to learn how to perform a good testing process, a newly assigned test manager or team leader who needs to learn more about testing, or a process improvement leader, this book will help you maximize your effectiveness…”
Libro electrónico -
35732Publicado 2002“…Segment essentiel de la documentation universitaire, les revues sont entrées depuis quelques années déjà dans le nouveau monde numérique. …”
Libro electrónico -
35733por Pan American Health Organization“…These policy recommendations have been presented in several WHO documents and their associated annexes, including the WHO treatment guidelines for multidrug- and rifampicin-resistant tuberculosis, 2018 update, issued by WHO in December 2018. …”
Publicado 2020
Libro electrónico -
35734por World Health Organization“…These policy recommendations have been presented in several WHO documents and their associated annexes, including the WHO treatment guidelines for multidrug- and rifampicin-resistant tuberculosis, 2018 update, issued by WHO in December 2018. …”
Publicado 2019
Libro electrónico -
35735Publicado 2016“…Standard foam hospital mattresses are seldom described. The documentation identified is not sufficient for guiding a choice between various foam mattresses. …”
Libro electrónico -
35736Publicado 2007“…Few studies were controlled and no RCTs were identified. These studies documented results from 182 IVM children. Two studies had follow-up data, but no studies had followed the children more than two years. …”
Libro electrónico -
35737por Giovannini, Adalberto, 1940-“…Pour ce qui est des derniers temps de la République, la mise au jour d’inscriptions et d’autres documents permet de mieux comprendre la transition des commandements extraordinaires de la fin de la République au principat instauré par Auguste. …”
Publicado 2015
Libro -
35738
-
35739Publicado 2020Tabla de Contenidos: “…Schwinghammer oChapter 1: Introduction: How to Use This Casebook oChapter 2: Active Learning Strategies oChapter 3: Patient Communication: Getting the Most Out of That One-on-One Time oChapter 4: The Patient Care Plan oChapter 5: Documentation of Pharmacist Encounters and Interventions oChapter 6: Pediatrics: Children Are Not Just Little Adults Level III oChapter 7: Geriatrics: Falling Frannie Level II oChapter 8: Palliative Care: Helpful Hospice Level III oChapter 9: Clinical Toxicology: Acetaminophen Toxicity: If One Is Good, More Is Better Level II oChapter 10: Cyanide Exposure: Expect the Unexpected Level II oChapter 11: Chemical Threat Agent Exposure: Name That Poison Level II *Section 2: Cardiovascular Disorders Section Editor: Julia M. …”
Libro electrónico -
35740Publicado 2017Tabla de Contenidos: “…9 1.1.4 FTC June 2015 Guidance on Data Security 11 1.1.5 FTC Protecting Personal Information Guide 14 1.1.6 Lessons from FTC Cybersecurity Complaints 15 1.1.6.1 Failure to Secure Highly Sensitive Information 16 1.1.6.1.1 Use Industry-Standard Encryption for Sensitive Data 16 1.1.6.1.2 Routine Audits and Penetration Testing are Expected 17 1.1.6.1.3 Health-Related Data Requires Especially Strong Safeguards 18 1.1.6.1.4 Data Security Protection Extends to Paper Documents 19 1.1.6.1.5 Business-to-Business Providers also are Accountable to the FTC For Security of Sensitive Data 20 1.1.6.1.6 Companies are Responsible for the Data Security Practices of Their Contractors 22 1.1.6.1.7 Make Sure that Every Employee Receives Regular Data Security Training for Processing Sensitive Data 23 1.1.6.1.8 Privacy Matters, Even in Data Security 23 1.1.6.1.9 Limit the Sensitive Information Provided to Third Parties 24 1.1.6.2 Failure to Secure Payment Card Information 24 1.1.6.2.1 Adhere to Security Claims about Payment Card Data 24 1.1.6.2.2 Always Encrypt Payment Card Data 25 1.1.6.2.3 Payment Card Data Should be Encrypted Both in Storage and at Rest 26 1.1.6.2.4 In-Store Purchases Pose Significant Cybersecurity Risks 26 1.1.6.2.5 Minimize Duration of Storage of Payment Card Data 28 1.1.6.2.6 Monitor Systems and Networks for Unauthorized Software 29 1.1.6.2.7 Apps Should Never Override Default App Store Security Settings 29 1.1.6.3 Failure to Adhere to Security Claims 30 1.1.6.3.1 Companies Must Address Commonly Known Security Vulnerabilities 30 1.1.6.3.2 Ensure that Security Controls are Sufficient to Abide by Promises about Security and Privacy 31 1.1.6.3.3 Omissions about Key Security Flaws can also be Misleading 33 1.1.6.3.4 Companies Must Abide by Promises for Security-Related Consent Choices 33 1.1.6.3.5 Companies that Promise Security Must Ensure Adequate Authentication Procedures 34 1.1.6.3.6 Adhere to Promises about Encryption 35 1.2 State Data Breach Notification Laws 36 1.2.1 When Consumer Notifications are Required 37 1.2.1.1 Definition of Personal Information 37 1.2.1.2 Encrypted Data 38 1.2.1.3 Risk of Harm 39 1.2.1.4 Safe Harbors and Exceptions to Notice Requirement 39 1.2.2 Notice to Individuals 40 1.2.2.1 Timing of Notice 40 1.2.2.2 Form of Notice 40 1.2.2.3 Content of Notice 41 1.2.3 Notice to Regulators and Consumer Reporting Agencies 41 1.2.4 Penalties for Violating State Breach Notification Laws 42 1.3 State Data Security Laws 42 1.3.1 Oregon 43 1.3.2 Rhode Island 45 1.3.3 Nevada 45 1.3.4 Massachusetts 46 1.4 State Data Disposal Laws 49 2 Cybersecurity Litigation 51 2.1 Article III Standing 52 2.1.1 Applicable Supreme Court Rulings on Standing 53 2.1.2 Lower Court Rulings on Standing in Data Breach Cases 57 2.1.2.1 Injury-in-Fact 57 2.1.2.1.1 Broad View of Injury-in-Fact 57 2.1.2.1.2 Narrow View of Injury-in-Fact 60 2.1.2.2 Fairly Traceable 62 2.1.2.3 Redressability 63 2.2 Common Causes of Action Arising from Data Breaches 64 2.2.1 Negligence 64 2.2.1.1 Legal Duty and Breach of Duty 65 2.2.1.2 Cognizable Injury 67 2.2.1.3 Causation 69 2.2.2 Negligent Misrepresentation or Omission 70 2.2.3 Breach of Contract 72 2.2.4 Breach of Implied Warranty 76 2.2.5 Invasion of Privacy by Publication of Private Facts 80 2.2.6 Unjust Enrichment 81 2.2.7 State Consumer Protection Laws 82 2.3 Class Action Certification in Data Breach Litigation 84 2.4 Insurance Coverage for Cybersecurity Incidents 90 2.5 Protecting Cybersecurity Work Product and Communications from Discovery 94 2.5.1 Attorney-Client Privilege 96 2.5.2 Work Product Doctrine 98 2.5.3 Non-Testifying Expert Privilege 101 2.5.4 Applying the Three Privileges to Cybersecurity: Genesco v. …”
Libro electrónico