Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Development 1,716
- Application software 1,430
- Engineering & Applied Sciences 1,425
- Management 1,220
- Computer Science 958
- Computer programs 908
- Computer networks 883
- Data processing 880
- Computer software 661
- Security measures 654
- Design 634
- Computer security 607
- Artificial intelligence 591
- Cloud computing 591
- Web sites 554
- Operating systems (Computers) 548
- Python (Computer program language) 545
- Web site development 514
- Database management 496
- Examinations 492
- Programming 490
- Computer programming 485
- Computer graphics 463
- Digital techniques 448
- Photography 436
- Java (Computer program language) 412
- Business & Economics 395
- Electrical & Computer Engineering 395
- Information technology 388
- Certification 372
-
26301por Yuan, Michael Juntao“…Chapter 2: Seam Hello World Chapter 3: Recommended JSF Enhancements Chapter 4: Rapid Application Development Tools Part II: Stateful Applications Made Easy Chapter 5: An Introduction to Stateful Framework Chapter 6: A Simple Stateful Application Chapter 7: Conversations Chapter 8: Workspaces and Concurrent Conversations Chapter 9: Transactions Part III: Integrating Web and Data Components Chapter 10: Validate Input Data Chapter 11: Clickable Data Tables Chapter 12: Bookmarkable Web Pages Chapter 13: The Seam CRUD Application Framework Chapter 14: Failing Gracefully Part IV: AJAX Support Chapter 15: Custom and AJAX UI Components Chapter 16: Enabling AJAX for Existing Componen..…”
Publicado 2007
Libro electrónico -
26302por Alexandrescu, Andrei“…CodeSaw is a free online learning tool that allows you to experiment with live code from your book right in your browser. 0201704315B11102003…”
Publicado 2001
Libro electrónico -
26303por Sells, Chris“…Unlike other WinForms books, this manuscript takes a more practical approach to the use of programming tools, such as Visual Studio. Sells’s book strikes a nice balance between theory and practice. …”
Publicado 2004
Libro electrónico -
26304Publicado 2006“…149 Chapter 10: Surviving—and Prospering from—the Economic Shocks of War, Terrorism, Drought, and Disease 169 Chapter 11: The Master Cyclist’s Favorite Forecasting Tools 185 Concluding Thoughts 211 Appendix A: The Master Cyclist Project’s Treasure Trove of Data and All-Star Team 213 Appendix B: A Business Cycle Primer 223 Notes 233 Index 239…”
Libro electrónico -
26305por Dyché, Jill“…“The guides based on the business tools that Jill uses with her own clients are fabulous.” – Robin Neidorf President, Electric Muse/Clio’s, Pen Research & Interpretation, Inc. …”
Publicado 2002
Libro electrónico -
26306Publicado 2007“…Contents About the Authors xxx Introduction 1 Part I Working with Text Documents Chapter 1 Introducing Word 2007 7 Chapter 2 Creating and Saving Documents 27 Chapter 3 Typing and Editing Text 59 Chapter 4 Using Spelling, Grammar, and Research Tools 95 Chapter 5 Printing and Faxing Documents 133 Part II Formatting a Document Chapter 6 Applying Character Formatting 155 Chapter 7 Formatting Paragraphs and Lists 191 Chapter 8 Creating and Applying Styles and Themes 227 Chapter 9 Formatting Documents and Sections 263 Chapter 10 Using and Creating Project Templates 297 Chapter 11 Working with Nonstandard Document Layouts 319 Part III Tables and Graphics Chapter 12 Creating and Formatting Tables 353 Chapter 13 Working with Photos 395 Chapter 14 Working with Clip Art and the Clip Organizer 425 Chapter 15 Working with Drawings and WordArt 455 Chapter 16 Working with Charts 491 Chapter 17 Working with SmartArt and Math Formulas 533 Part IV Collecting and Managing Data Chapter 18 Performing Mail and Data Merges 563 Chapter 19 Copying, Linking, and Embedding Data 601 Chapter 20 Worki..…”
Libro electrónico -
26307Publicado 2009“…Understand the current and emerging threats to VoIP networks Learn about the security profiles of VoIP protocols, including SIP, H.323, and MGCP Evaluate well-known cryptographic algorithms such as DES, 3DES, AES, RAS, digital signature (DSA), and hash function (MD5, SHA, HMAC) Analyze and simulate threats with negative testing tools Secure VoIP services with SIP and other supplementary protocols Eliminate security issues on the VoIP network border by deploying an SBC Configure enterprise devices, including firewalls, Cisco Unified Communications Manager, Cisco Unified..…”
Libro electrónico -
26308Publicado 1999“…It includes a CD-ROM (Macintosh and Windows compatible) with the full source code to the examples in the book, a trial version of Palm's Software Development Kit, and third-party developer tools, including Metrowerks' CodeWarrior Lite programming kit. …”
Libro electrónico -
26309Publicado 2009“…Includes free access to comprehensive Web-based tools and resources at www.Sink-Swim.com: More than 75 easy-to-use online calculators and budget spreadsheets to help you get on track and stay on track Sample asset allocation plans you can adjust for any stage of your career and any portfolio Up-to-the-minute updates on pension law, regulation, enforcement, and estate planning Free Sink or Swim Newsletter, and much more…”
Libro electrónico -
26310Publicado 2009“…Sherry Seethaler gives you a powerful arsenal of tools for making sense of science. You’ll learn how to think more sensibly about everything from mad cow disease to global warming–and how to make better science-related decisions in both your personal life and as a citizen. …”
Libro electrónico -
26311Publicado 2007“…A systematic approach to understanding the basics of voice over IP Understand the basics of enterprise and public telephony networking, IP networking, and how voice is transported over IP networks Learn the various caveats of converging voice and data networks Examine the basic VoIP signaling protocols (H.323, MGCP/H.248, SIP) and primary legacy voice signaling protocols (ISDN, C7/SS7) Explore how VoIP can run the same applications as the existing telephony system but in a more cost-efficient and scalable manner Delve into such VoIP topics as jitter, latency, packet loss, codecs, QoS tools, and security Voice over IP (VoIP) has become an important factor in network communications, promising lower operational costs, greater flexibility, and a variety of enhanced applications. …”
Libro electrónico -
26312por Hess, Edward D.“…Now, two renowned experts on entrepreneurship identify the 8 “killer mistakes” that cause most business failures–and give you the knowledge, tools, and hands-on advice to avoid them, so you can build a business that thrives . …”
Publicado 2009
Libro electrónico -
26313por Barnett, Shawn“…. * In-depth coverage of every feature and control ensures that you have access to the tools you need for every shot. * Full-color examples demonstrate how different settings affect your photos. * Expert coverage of lenses, lighting, and subject matter gives you the practical knowledge you need to go after any shot. * Step-by-step instructions on photo editing and image management help you get the most out of your camera's software. * A detailed review of accessories for your camera explains which of these add-ons offer the most value for your needs. * Dozens of tips and tricks prepare you for every situation you're likely to encounter - in the field, at the studio, or at your next wedding or family reunion…”
Publicado 2009
Libro electrónico -
26314por Roland, John F.“…CCSP Self-Study: Securing Cisco IOS Networks (SECUR) is a Cisco authorized, self-paced learning tool that helps you gain mastery over all security techniques and technologies, including newer topics such as Cisco Easy VPN and Security Device Manager (SDM). …”
Publicado 2004
Libro electrónico -
26315por Conti, Greg“…Uncover the trail of informational “bread crumbs” you leave when you use Google search How Gmail could be used to track your personal network of friends, family, and acquaintances How Google’s map and location tools could disclose the locations of your home, employer, family and friends, travel plans, and intentions How the information stockpiles of Google and other online companies may be spilled, lost, taken, shared, or subpoenaed and later used for identity theft or even blackmail How the Google AdSense and DoubleClick advertising services could track you around the Web How to systematically reduce the personal information you expose or give away This book is a wake-up call and a “how-to” self-defense manual: an indispensable resource for everyone, from private citizens to security professionals, who relies on Google. …”
Publicado 2009
Libro electrónico -
26316Publicado 2013“…Robert Maurer shows you how to: Lower costs—by offering little rewards Raise quality—by reducing mistakes Manage difficult people— one step at a time Boost morale and productivity— in five minutes a day Implement big ideas—through small but steady actions Sell more—in less time Filled with practical tips and ready-to-use tools for managers, innovators, and entrepreneurs, The Spirit of Kaizen is the essential handbook for a changing world. …”
Libro electrónico -
26317por Faith, Curtis M.“…In Trading from Your Gut , Curtis Faith, renowned trader and author of the global bestseller Way of the Turtle , reveals why human intuition is an amazingly powerful trading tool, capable of processing thousands of inputs almost instantaneously. …”
Publicado 2010
Libro electrónico -
26318Publicado 2015“…Coverage includes Planning, hiring, training, funding, and building a world-class WebSphere engineering support organization Implementing tight standards and consistent, comprehensive processes for managing the entire WebSphere engineering life cycle Creating optimal testing environments, administering parallel testing pipelines, and managing testing workloads Empowering production support teams with knowledge, system privileges, and the right tools Managing production emergencies and critical situations: evaluating problem severity, mitigating customer experience, restoring service, performing post-problem resolution, and much more Maximizing the stability of large-scale interconnected WebSphere systems for composite applications Supporting WebSphere platforms that provide end-to-end SOA infrastructure Introduction 1 Chapter 1: Organization Models and Choices 7 Chapter 2: Building a World-Class WebSphere Team Through Hiring and Training 41 Chapter 3: WebSphere Operations Framework 75 Chapter 4: Engagement Challenges 93 Chapter 5: Server Build 121 Chapter 6: Functional and Integration Testing Environment Support 139 Chapter 7: Stress-Testing Environment Support 153 Chapter 8: Production Environment Support 171 Chapter 9: Managing a ..…”
Libro electrónico -
26319Publicado 2008“…Becoming a better questioner may be the most powerful thing you can do right now to improve your managerial effectiveness--and this book gives you all the insights, tools, and techniques you’ll need to get there. Evaluate your ..…”
Libro electrónico -
26320por Rutledge, Patrice-Anne“…Rutledge uncovers all the necessary skills to use these tools in this easy-to-understand book." Tamar Weinberg , Techipedia "Using online social networks for business and professional advancement requires more than just understanding the technology. …”
Publicado 2008
Libro electrónico