Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Science: general issues 921
- Management 363
- Medicine 346
- Computer programs 302
- Historia 282
- Business 263
- Microsoft Office 253
- Engineering & Applied Sciences 250
- Formación profesional 244
- Derecho Comunitario 230
- Business & Economics 223
- History 200
- Neurosciences 175
- Psychology 157
- Commerce 151
- Computer Science 151
- Information technology 149
- Relaciones exteriores 148
- Investigación científica 135
- Computer networks 134
- Innovaciones tecnológicas 131
- Immunology 127
- Marketing & Sales 127
- Microsoft Excel (Computer file) 126
- Leadership 115
- United States 114
- Data processing 113
- Operating systems (Computers) 112
- Security measures 110
- Microsoft SharePoint (Electronic resource) 104
-
14201Publicado 2012Tabla de Contenidos: “…; Evaluating Modelling Tools; Budgeting and Forecasting; Microsoft Office Tools: Excel, Access, and Project; The Final Decision; What Skills Do You Need to Be a Good Financial Modeller?…”
Libro electrónico -
14202por Thurrott, Paul AlanTabla de Contenidos: “…SummaryChapter 8: Get It Done with Windows 8's Productivity Apps; A Note About the Windows Productivity Apps and Your Microsoft Account; People; Mail; Calendar; Messaging; SkyDrive; Windows Reader; The Bing Apps; Microsoft Office Comes to Windows . . . Sort Of; Summary; Chapter 9: Relaxing with Windows 8's Photo and Entertainment Apps; A Note About the Windows 8 Entertainment Apps and Your Microsoft Account; Enjoying Photos; Buying, Managing, and Playing Music; Buying, Managing, and Playing Movies and TV Shows; Summary; Chapter 10: Xbox Games with Windows 8; Games and the Metro Environment…”
Publicado 2012
Libro electrónico -
14203por Cummings, ChipTabla de Contenidos: “…Finding Tax Sale ListingsCounty Website; Call or Visit the County Office; Check Local Newspapers; Tax Listing Service Subscription; Auction Request Letters; Filtering Your Data; Evaluating Different Types of Properties; Residential; Commercial and Industrial; Unimproved Vacant Land; Special Use; Conducting Internet Property Research; Recruiting Local Help; 10 Rules for Qualifying Every Property; Setting Your Bids; Chapter 3: Going, Going, Gone!…”
Publicado 2013
Libro electrónico -
14204por Cole, EricTabla de Contenidos: “…; Pain Killer Security; Reducing the Surface Space; HTML Embedded Email; Buffer Overflows; Macros in Office Documents; The Traditional Threat; Common Cold; Reactive Security; Automation; The Emerging Threat…”
Publicado 2013
Libro electrónico -
14205
-
14206
-
14207por Spannaus, Timothy W. 1946-Tabla de Contenidos: “…Sync Sound; Chapter Twelve: Your Assignment 2 Edit in Camera; Plan; Shoot; Section III: Production; Chapter Thirteen: Selecting and Surveying Locations; Back to the Script; Location Survey; Shots and Camera Angles; Lighting and Electrical Power; Specific Locations: Offices; Specific Locations: Homes; Specific Locations: Factories, Shops, Warehouses, and Labs; Exteriors; Commercial and Retail Locations; Location Releases; Green Screen-Any Location, Any Time…”
Publicado 2012
Libro electrónico -
14208por Kriegel, AlexTabla de Contenidos: “…; Relational Database Management Systems; IBM DB2 LUW; Oracle; Microsoft SQL Server; Microsoft Access; PostgreSQL; MySQL; HSQLDB and OpenOffice BASE; What Is SQL?; The SQL Standard; Dialects of SQL…”
Publicado 2011
Libro electrónico -
14209por Canavan, TomTabla de Contenidos: “…Using TracerouteFinding Subdomains; Enumeration; Attacking and Owning the Site; Wiping Out Their Tracks; Examples of Threats; Social Engineering; Calling into Your Office; Sending in a Trusted Friend; Using USB Keys; Indiscriminate Browsing or Instant Messaging; External Media; Vendors or External Clients/Customers as the Threat; Reviewing Your Perimeter; Using Virus Protection; Banning Passwords on Desks; Enforcing a Password Complexity and Change Policy; Policing Open Wireless; Tools for Wireless Detection; How Will You Respond to an Incident?…”
Publicado 2011
Libro electrónico -
14210por Malik, SahilTabla de Contenidos: “…Branding the RibbonMigrating MOSS 2007 Branding Artifacts; Summary; Chapter 4 Migration for the Developer; Savvy Business User Developers; SharePoint Designer 2010; SharePoint Designer Workflows; Office Infopath 2010; Integrating Visio Diagrams and Visio Services with Workflows; Exporting Customizations As . wsp Files; Exploring the New ECM Features; Content Authoring Improvements and Analytics; Managed Metadata Service; Enterprise Content Types; Document IDs and Document Sets; In-Place Records Management; . …”
Publicado 2012
Libro electrónico -
14211por Rosen, Bob, 1955-Tabla de Contenidos: “…; From the Pool to the CEO's Office; Emotional Health; CHAPTER 7: Self-Awareness; A Leader with a Mind of His Own; Telling the Truth to Yourself and Others; Accept Who You Are; Failed Leadership Arises from Ignorance; Let Self-Reflection Reign, and Success Will Follow; Learning to Be Self-Aware; CHAPTER 8: Positive Emotions; Triumphing Over Fear; Part of Our Hardwiring; Many Expressions of Love…”
Publicado 2014
Libro electrónico -
14212Publicado 2013Tabla de Contenidos: “…Cloud-Hosted ArchitecturesSecurity Features; Identity Features; Administration Model; Summary; Chapter 2: What''s New in Sharepoint 2013; Introduction to SharePoint 2013; Deployment Scenarios; On-Premise Deployment; Office 365 Deployment; Hosted Deployment; Hybrid Deployment; Packaging Scenarios; Full-Trust Farm Solution; Partial-Trust Sandboxed Solution; Apps for SharePoint; The Programming Model; The Evolution of SharePoint Programming; Challenges with CSOM in SharePoint 2010; Challenges with Server-Side Code; The New Programming Model; The App Model; SharePoint-Hosted Apps…”
Libro electrónico -
14213Publicado 2011Tabla de Contenidos: “…Exploring the Benefits of SharePoint OnlineFiguring Out Where SharePoint Online Is Going; Chapter 3: SharePoint Development Overview; Redefining What It Means to Be a Developer; Types of SharePoint Development; SharePoint Development Tools; Part II: Developing with Your Web Browser and Microsoft Office; Chapter 4: Developing Sites with Your Web Browser; Creating a SharePoint Site; Developing SharePoint Pages; Developing Your Own Navigation; Wrangling Data on Your Pages; Developing a Custom Look and Feel; Reusing Your Development Efforts with Templates…”
Libro electrónico -
14214por Yamazaki, MicheleTabla de Contenidos: “…Griffin, UnSafe Film Office""; ""Using Red Giant Magic Bullet Looks for Compositing Greenscreen Footage""; ""Color Effects""; ""Bleach Bypass""; ""Film/Video Tinting""; ""Day for Night""; ""Working with Skin Tones""…”
Publicado 2011
Libro electrónico -
14215Publicado 2010Tabla de Contenidos: “…Mail Flow ArchitectureAttack Points; Dangers Associated with Mail Service Attacks; Scenario 1: Directory Harvest Attacks; Scenario 2: SMTP Auth Attacks; Scenario 3: Mail Relay Attacks; The Future of Mail Service Attacks; Defenses against Mail Service Attacks; Defense in the Perimeter Network; Defense on the Internal Network; Supporting Services; Summary; Chapter 5. Office - Macros and ActiveX; Macro and Client-Side Attack Anatomy; Macro Attacks; ActiveX Attacks; Dangers Associated with Macros and ActiveX; Scenario 1: Metasploit Reverse TCP Connection…”
Libro electrónico -
14216por Froehlich, Andrew G.Tabla de Contenidos: “…CVOICE 8.0: Implementing Cisco Unified Communications Voice over IP and QoS v8.0; Contents; Introduction; Assessment Test; Chapter 1: An Introduction to Traditional Telephony and Cisco Unified Communications; Understanding Traditional Telephony Components; Telephony Edge Devices; Phone Switches; The Central Office; The Local Loop; Trunks; National and International Calling PSTN; Understanding Private Telephony Phone Systems; Key System; PBX; Understanding the Unified Communications Model; Endpoints; Applications; Call Processing Agents; Network Infrastructure…”
Publicado 2011
Libro electrónico -
14217por Etheridge, DeniseTabla de Contenidos: “…Understanding Dates and TimesFormat Percentages; Format Fractions; Format in Scientific Notation; Format as Text; Add a Border; Change the Font or Font Size; Add a Background Color; Change the Font Color; Bold, Underline, or Italicize; Align Data; Rotate Data; Wrap Text; Merge and Center; Apply a Style; Using Format Painter; Clear Formats; Chapter 3: Structuring Your Workbook; Cut, Copy, and Paste Cells; Using Live Preview with Paste; Paste from the Office Clipboard; Insert or Delete; Find and Replace Information; Change the Name of a Worksheet; Change Column Widths or Row Heights…”
Publicado 2010
Libro electrónico -
14218por Kaufman, Lloyd, 1945-Tabla de Contenidos: “…KAUFMAN'S DEFINITIVE REMEDY FOR GETTING PEOPLE TO POSSIBLY PAY ATTENTION TO YOUR MOVIE, PART CBROKEBACK FILMMAKERS, OR HOW A COUPLE OF COLORADO FILMMAKERS HAD A RAUNCHY TITLE AND OFFENDED AN INTERNET CONGLOMERATE: BY RICHARD TAYLOR AND ZACK BEINS; Bonus Chapter two Putting the "Miss" in Mismarketing: Five Good Movies That Poor Marketing Almost Ruined; OBSERVE AND REPORT (2009); OFFICE SPACE (1999); FIGHT CLUB (1999); GEORGE A. …”
Publicado 2011
Libro electrónico -
14219Publicado 2016Tabla de Contenidos: “…The Notify Key -- Image File Execution Options -- AppInit_DLLs -- Shell Extensions -- Browser Helper Objects -- Scheduled Tasks -- AppCompatFlags -- Program Execution -- LANDesk -- Malware -- Audio Devices -- AmCache Hive -- Summary -- 4 - CASE STUDIES: USER HIVES -- Introduction -- NTUSER.DAT -- System Configuration Information -- AutoStart -- The Run Key -- The RunOnce Key -- Other AutoStart Locations -- Program Execution -- Applets -- SysInternals -- UserAssist -- Application Compatibility Assistant -- Terminal Server Client -- Malware -- File Access -- RecentDocs -- ComDlg32 -- Microsoft Office File/Place MRUs -- TrustRecords -- Adobe Reader -- User Activity -- TypedPaths -- TypedURLS -- Searches -- File Associations -- USRCLASS.DAT -- AutoStart -- Program Execution -- File Access -- Photos -- Shellbags -- Summary -- 5 - REGRIPPER -- Introduction -- What Is RegRipper? …”
Libro electrónico -
14220Publicado 2014Tabla de Contenidos: “…; Additional Reading; Chapter 4: Don't Look for a Free Lunch; Software-Consider the Source; Issues with Warez; Hidden Agenda; Lesser Threats; How to Protect Yourself; Additional Reading; Chapter 5: Don't Do Secure Things from Insecure Places; Background: Wireless Networking at Home, at Work, and on the Road; Home Sweet Home. . .; Back at the Office. . .; On the Road Again. . .; Encryption Standards; VPN; Workplace Security, on the Road; Extra Layers of Protection; Other Uses for VPNs; Additional Reading…”
Libro electrónico