Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer programs 80
- Engineering & Applied Sciences 60
- Application software 50
- Development 49
- Computer Science 44
- Operating systems (Computers) 38
- Computer security 37
- Microsoft Excel (Computer file) 36
- Business 34
- Data processing 34
- Security measures 34
- Design 31
- JavaScript (Computer program language) 31
- Programming 31
- Electronic spreadsheets 30
- Computer graphics 29
- Digital techniques 28
- Photography 28
- Computer networks 26
- Computer programming 26
- Java (Computer program language) 24
- Web site development 24
- Web sites 21
- Database management 20
- Image processing 19
- Computer software 18
- Mac OS 18
- Microsoft Windows (Computer file) 18
- Python (Computer program language) 18
- Macintosh (Computer) 17
-
241por Conner, NancyTabla de Contenidos: “…Subscribe to a document's RSS feedTurn Back Time: Your Doc's Revision History; Revert to a previous version; Compare revisions; Organizing and Finding Documents; Hide a document; Create a folder; Put documents in a folder; Change a folder's color; Remove documents from a folder; Hide or delete a folder; Searching for Documents; 3. …”
Publicado 2008
Libro electrónico -
242por Bucki, LisaTabla de Contenidos: “…Teach Yourself Visually Microsoft Office PowerPoint 2007; Table of Contents; How to Use This Book; Chapter 1 PowerPoint Basics; An Introduction to PowerPoint; Start and Exit PowerPoint; Understanding the Normal View; Navigate PowerPoint Views; Work with Ribbon Groups, Commands, and Galleries; Hide and Redisplay Ribbon Commands; Find and Use KeyTips; Using the Quick Access Toolbar; Resize the Notes Pane; Using Help; Chapter 2 Presentation Fundamentals; Start a New Presentation; Save a Presentation; Open an Existing Presentation; Close a Presentation; Delete a Presentation…”
Publicado 2007
Libro electrónico -
243Publicado 2016Tabla de Contenidos: “…Constituencies and OwnershipChapter Three: The Multiplication of Actors ; The UN Human Rights Commission/ Human Rights Council; International and Regional Standard Setting; Chapter Four: The Role of Ngos in the Creation of Norms ; Ngos and the Human Rights Agenda; Ngos and Standard Setting; Ngo Strategies and Methods in Standard Setting; Ngos and States Play Hide-and-Seek; Chapter Five: The Question of Deficits ; The Deficit of Participants; The Deficit of Voice; The Deficit of Democracy; Language: Style, Content, and Implementation; Understanding Un Institutions and Norm Setting…”
Libro electrónico -
244Publicado 2014Tabla de Contenidos: “…Eye-Related IconsMottled Gray Texture Icon; Three Stars; Hide Image; Pose Toolkit; Pose; Orient; Environment Toolkit; Share and Make Toolkit; Chapter 3. 123D Meshmixer; Why Use Meshmixer?…”
Libro electrónico -
245Publicado 2001Tabla de Contenidos: “…Denning -- Re: Denning's crypto anarchy / Duncan Frissell -- Hiding crimes in cyberspace / Dorothy E. Denning and William E. …”
991009621943906719 -
246por Simon, Jinjer L., 1966-Tabla de Contenidos: “…Activate the Visual Basic EditorOpen Visual Basic Editor Windows; Set Properties for a Project; Set Display Options for the Code Window; Add a New Module; Remove a Module; Hide a Macro; Update a Macro; Chapter 3: INTRODUCING VISUAL BASIC FOR APPLICATIONS; Create Sub Procedures; Create Functions; Comment Your Code; Reference Cells and Ranges; Understanding Variables and Data Types; Declare Variables; Work with Strings; Work with Numbers; Create a Constant; Chapter 4: INTRODUCING THE EXCEL OBJECT MODEL; Discover the Excel Object Model; Access the Excel Object Model Reference…”
Publicado 2010
Libro electrónico -
247por McFedries, PaulTabla de Contenidos: “…Control When a Person Can Use the ComputerAllow a Person to Use Only Specified Programs; Control Video Game Use; Switch to Advanced Sharing to Improve Security; Protect a File or Folder with Permissions; Add a Password to Your User Account; Configure User Account Control Settings; Require Ctrl+ Alt+ Delete Before Logging On; Lock Your Computer to Prevent Others from Using It; Automatically Lock Your Computer; Prevent Others from Starting Your Computer; Hide Recently Used Documents to Enhance Privacy; Prevent Malicious Code from Running; Safeguard Your Computer with a System Image Backup…”
Publicado 2009
Libro electrónico -
248por Etheridge, DeniseTabla de Contenidos: “…Excel 2007 Top 100 Simplified Tips & Tricks; Table of Contents; Chapter 1 Boost Your Efficiency; Validate with a VALIDATION LIST; Validate with DATA ENTRY RULES; Extend a series with AUTOFILL; Insert SYMBOLS OR SPECIAL CHARACTERS; Hide rows by GROUPING AND OUTLINING; FIND AND REPLACE formats; ADD COMMENTS to your worksheet; Let Excel READ BACK YOUR DATA; Create your own SORT OR AUTOFILL; Chapter 2 Work with Formulas and Functions; ENTER FORMULAS using a variety of methods; Name CELLS AND RANGES; Define a CONSTANT; CREATE FORMULAS that include names; Calculate with THE FUNCTION WIZARD…”
Publicado 2007
Libro electrónico -
249por Pogue, David, 1963-Tabla de Contenidos: “…Documents, Programs, & Spaces; Quitting Programs; Force Quitting Programs; The New, Improved ""Alt-Tab""; Exposé: Death to Window Clutter; Return to the desktop; Another way to Exposé; Three Triggers for Exposé; Keystrokes; Multiple-button mouse clicks; Spaces: Your Free Quad-Display Mac; Using Spaces; Moving windows among screens; Hiding Programs the Old-Fashioned Way; Hiding (Minimizing) Individual Windows; How Documents Know Their Parents…”
Publicado 2008
Libro electrónico -
250Publicado 2024Tabla de Contenidos: “…Field metadata -- Length-delimited encoding -- Packed versus unpacked repeated fields -- Maps -- Summary -- Quiz -- Answers -- Chapter 6: Schema Evolution over Time -- Technical requirements -- Backward and forward compatibility -- Backward compatibility -- Forward compatibility -- Some problems -- Conclusion -- Disabling tags - reserved tags -- Disabling field names - reserved names -- The evolution rules -- Summary -- Quiz -- Answers -- Chapter 7: Implementing the Address Book in Go -- Technical requirements -- The project: address book -- Defining the schema -- Boilerplate code -- Converting string to enum values -- Reading/writing from/to a file -- Adding entries -- The business logic -- The CLI -- Listing entries -- The business logic -- The CLI -- Hiding sensitive data -- Summary -- Challenge -- Chapter 8: Implementing the Address Book in Python -- Technical requirements -- The Address Book project -- Defining the schema -- Boilerplate code -- Converting strings to enum values -- Reading/writing from/to files -- Adding entries -- The business logic -- The CLI -- Listing entries -- The business logic -- The CLI -- Hiding sensitive data -- Interoperability between Go and Python -- Summary -- Challenge -- Chapter 9: Developing a Protoc Plugin in Golang -- Technical requirements -- The project -- What are custom options? …”
Libro electrónico -
251por McFedries, PaulTabla de Contenidos: “…Replace Text in a DocumentCheck Spelling and Grammar; Save a Document as a Web Page; Print a Document; Close a Document; Make a Document Compatible with Earlier Versions of Office; Chapter 3: Formatting Office Documents; Display and Hide the Formatting Palette; Change the Font and Font Size; Apply Font Effects; Change the Font Color; Align Text; Copy Formatting; Chapter 4: Adding and Editing Graphics; Display and Hide the Object Palette; Draw a Shape; Insert a Clip Art Image; Insert a Photo; Insert a WordArt Image; Insert a SmartArt Graphic; Move or Resize a Graphic; Crop a Picture…”
Publicado 2009
Libro electrónico -
252por McFedries, Paul T.Tabla de Contenidos: “…Delete a PivotTableChapter 4: CHANGING THE PIVOTTABLE VIEW; Move a Field to a Different Area; Change the Order of Fields within an Area; Change the Report Layout; Sort PivotTable Data with AutoSort; Move Row and Column Items; Group Numeric Values; Group Date and Time Values; Group Text Values; Hide Group Details; Show Group Details; Ungroup Values; Chapter 5: FILTERING A PIVOTTABLE; Apply a Report Filter; Change the Report Filter Layout; Filter Row or Column Items; Filter PivotTable Values; Hide Items in a Row or Column Field; Use Search to Display Multiple Items…”
Publicado 2010
Libro electrónico -
253Publicado 2010Tabla de Contenidos: “…Sinnreich -- Rape and sexual abuse in hiding / Zoe Waxman -- Assaults on motherhood -- Reproduction under the swastika: The other side of the glorification of motherhood / Helga Amesberger -- Forced sterilization and abortion as sexual abuse / Ellen Ben-Sefer -- Sexual violence in literature and cinema -- Sexual abuse in Holocaust literature: Memoir and fiction / S. …”
Click para texto completo desde fuera UPSA
Click para texto completo desde UPSA
Libro electrónico -
254Publicado 2020Tabla de Contenidos: “…Voigt -- When lawyers are war criminals / Scott Horton -- Hiding behind a mantle of terrorism / Jehan Johnson -- United States military law of war doctrine : making the ICC irrelevant to the ground combat forces of the United States in the early twenty-first century / Rex A. …”
Libro electrónico -
255por Schirrmacher, BeateTabla de Contenidos: “…When the Post-Truth Devil Hides in the Details: A Digital Ethnography of Virtual Anti-Vaccination Groups in Lithuania -- Chapter 13. …”
Publicado 2024
Libro electrónico -
256por Newman, Graeme R.“…By using the Internet addresses of other users or using another person's or organization's computers or computing environment, criminals can hide their trails and escape detection. After identifying the multiple opportunities for crime in the world of e-commerce, the book describes specific steps that can be taken to prevent e-commerce crime at particular points of vulnerability. …”
Publicado 2003
Universidad Loyola - Universidad Loyola Granada (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Enlace del recurso
Libro electrónico -
257Publicado 2009“…The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. …”
Libro electrónico -
258por Borza, Melissa A. author“…She sees math in everything she does. She tries to hide this from her friends, because she thinks it’s too geeky. …”
Publicado 2017
Libro electrónico -
259Publicado 2023“…Covers one- and two-sided detection problems by furnishing continuous and discret time strategies; examines two-sided search strategies with solutions in hide and seek games in many discrete and continuous bounded…”
Libro electrónico -
260por Chaffer, JonathanTabla de Contenidos: “…OLE_LINK4OLE_LINK3; Styling and Animating; Modifying CSS with inline properties; OLE_LINK12; OLE_LINK11; Setting computed style-property values; OLE_LINK8; OLE_LINK7; Using vendor-specific style properties; Hiding and showing elements; Effects and duration; Speeding in; Fading in and fading out; Sliding up and sliding down; Toggling visibility; Creating custom animations; Building effects by hand; Animating multiple properties at once; OLE_LINK6; OLE_LINK5; OLE_LINK10; OLE_LINK9; Positioning with CSS; OLE_LINK14; OLE_LINK13; Simultaneous versus queued effects…”
Publicado 2013
Libro electrónico