Mostrando 8,101 - 8,120 Resultados de 9,070 Para Buscar '"Windows"', tiempo de consulta: 0.13s Limitar resultados
  1. 8101
    Publicado 1998
    “…Proverbs, maxims, adages, and poems are fun, and—an unexpected benefit—they provide a window on the Spanish speaking mind…”
    Libro electrónico
  2. 8102
    Publicado 2003
    Tabla de Contenidos: “…Installation and setup of the infrastructure components -- 3.1 Overview of the installation process -- 3.2 Installation worksheet -- 3.3 Installing prerequisite software components -- 3.3.1 Checking versions -- 3.3.2 Installing and configuring DB2 -- 3.3.3 Installing and configuring WebSphere Application Server -- 3.3.4 Upgrading the HTTP Server -- 3.3.5 Installing WebSphere MQ -- 3.3.6 Installing Sun's JDK -- 3.3.7 Installing CrossWorlds VisiBroker -- 3.3.8 Installing and configuring CrossWorlds InterChange Server -- 3.3.9 Installing CrossWorldsTPI -- 3.3.10 Installing IBM SecureWay Directory Version 3.2.2 for Windows -- 3.4 Installing and configuring WebSphere Business Connection -- 3.4.1 Starting the WebSphere Business Connection installation program -- 3.4.2 Applying updates to WebSphere Application Server -- 3.4.3 Configuring the Web Services Gateway -- 3.4.4 Web Services Gateway channels -- 3.5 Configuring security -- 3.5.1 Configuring SecureWay Directory -- 3.5.2 Configuring WebSphere Security -- 3.5.3 Securing the Web Services Gateway administration…”
    Libro electrónico
  3. 8103
    Publicado 2002
    Tabla de Contenidos: “…Using the C++ toolkit in Win32 programs -- 10.1 The Win32Status sample -- 10.1.1 The sample code -- 10.1.2 The output window -- 10.2 Writing Win32 code with Sametime C++ toolkit -- 10.2.1 Libraries -- 10.2.2 Using wmain -- 10.2.3 The message loop -- 10.3 Summary -- Part 4 COM and Sametime Links toolkits -- Chapter 11. …”
    Libro electrónico
  4. 8104
    por Hajnsek, Irena
    Publicado 2021
    Tabla de Contenidos: “…3.5.3 Subarctic Peatland Characterisation and Monitoring -- 3.5.3.1 Introduction, Motivation and Literature Review -- 3.5.3.2 Experimental Results -- 3.5.3.2.1 La Baie des Mines -- Peatland Hydrology Characteristics for Bog-Fen Discrimination -- Application of the Touzi Decomposition to Polarimetric ALOS Data: Required Processing Window Size for Unbiased ICTD -- Analysis of the ALOS Acquisitions -- Peatland Subsurface Water Flow Monitoring Using Polarimetric May and November ALOS Acquisitions: Multi-polarisation Versus Pol... -- 3.5.3.2.2 Wapusk National Park -- 3.5.3.3 Discussion on the Role of Polarimetry, on the Maturity of the Application and Conclusions -- 3.5.3.4 Acknowledgement -- 3.6 Monitoring Change Detection Produced by Tsunamis and Earthquakes by Using a Fully Polarimetric Model-Based Decomposition -- 3.6.1 Introduction, Motivation and Literature Review -- 3.6.2 Methodology -- 3.6.3 Experimental Results -- 3.6.4 Comparison with Single-/Dual-Polarisation Data -- 3.6.5 Discussion on the Role of Polarimetry, on the Maturity of the Application and Conclusions -- 3.7 Summary (Table 3.13) -- References -- 4: Cryosphere Applications -- 4.1 Introduction -- 4.2 Land Ice Extinction Estimation Using PolInSAR -- 4.2.1 Introduction, Motivation, and Literature Review -- 4.2.2 Methodology -- 4.2.3 Experimental Results -- 4.2.4 Comparison with Single/Dual Polarisation Data -- 4.2.5 Discussion on the Role of Polarimetry, on the Maturity of the Application, and Conclusions -- 4.3 Snow Water Equivalent Retrieval -- 4.3.1 Introduction, Motivation, and Literature Review -- 4.3.2 Methodology -- 4.3.2.1 Polarimetric Decomposition for Snow-Covered Areas -- 4.3.2.2 Snow Water Equivalent Retrieval Algorithm -- 4.3.3 Experimental Results -- 4.3.4 Comparison with Single/Dual Polarisation Data…”
    Libro electrónico
  5. 8105
    Publicado 2017
    Tabla de Contenidos: “…17.5 Smoothing Signals -- 17.6 Logarithms and Other Transformations -- 17.7 Trends and Periodicity -- 17.8 Windowing -- 17.9 Brainstorming Simple Features -- 17.10 Better Features: Time Series as Vectors -- 17.11 Fourier Analysis: Sometimes a Magic Bullet -- 17.12 Time Series in Context: The Whole Suite of Features -- 17.13 Further Reading -- 17.14 Glossary -- Chapter 18 Probability -- 18.1 Flipping Coins: Bernoulli Random Variables -- 18.2 Throwing Darts: Uniform Random Variables -- 18.3 The Uniform Distribution and Pseudorandom Numbers -- 18.4 Nondiscrete, Noncontinuous Random Variables -- 18.5 Notation, Expectations, and Standard Deviation -- 18.6 Dependence, Marginal and Conditional Probability -- 18.7 Understanding the Tails -- 18.8 Binomial Distribution -- 18.9 Poisson Distribution -- 18.10 Normal Distribution -- 18.11 Multivariate Gaussian -- 18.12 Exponential Distribution -- 18.13 Log-Normal Distribution -- 18.14 Entropy -- 18.15 Further Reading -- 18.16 Glossary -- Chapter 19 Statistics -- 19.1 Statistics in Perspective -- 19.2 Bayesian versus Frequentist: Practical Tradeoffs and Differing Philosophies -- 19.3 Hypothesis Testing: Key Idea and Example -- 19.4 Multiple Hypothesis Testing -- 19.5 Parameter Estimation -- 19.6 Hypothesis Testing: t-Test -- 19.7 Confidence Intervals -- 19.8 Bayesian Statistics -- 19.9 Naive Bayesian Statistics -- 19.10 Bayesian Networks -- 19.11 Choosing Priors: Maximum Entropy or Domain Knowledge -- 19.12 Further Reading -- 19.13 Glossary -- Chapter 20 Programming Language Concepts -- 20.1 Programming Paradigms -- 20.2 Compilation and Interpretation -- 20.3 Type Systems -- 20.4 Further Reading -- 20.5 Glossary -- Chapter 21 Performance and Computer Memory -- 21.1 Example Script -- 21.2 Algorithm Performance and Big-O Notation -- 21.3 Some Classic Problems: Sorting a List and Binary Search…”
    Libro electrónico
  6. 8106
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Title page -- Copyright and credits -- Dedication -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Python for Offensive Security -- Chapter 1: Introducing Offensive Security and Python -- Understanding the offensive security landscape -- Defining offensive security -- The origins and evolution of offensive security -- Use cases and examples of offensive security -- Industry relevance and best practices -- The role of Python in offensive operations -- Key cybersecurity tasks that are viable with Python -- Python's edge in cybersecurity -- The limitations of using Python -- Ethical hacking and legal considerations -- The key protocols of ethical hacking -- Ethical hacking's legal aspects -- Exploring offensive security methodologies -- Significance of offensive security -- The offensive security lifecycle -- Offensive security frameworks -- Setting up a Python environment for offensive tasks -- Setting up Python on Linux -- Setting up Python on macOS -- Setting up Python on Windows -- Exploring Python modules for penetration testing -- Essential Python libraries for penetration testing -- Case study - Python in the real world -- Scenario 1 - real-time web application security testing -- Scenario 2 - network intrusion detection -- Summary -- Chapter 2: Python for Security Professionals - Beyond the Basics -- Utilizing essential security libraries -- Harnessing advanced Python techniques for security -- Compiling a Python library -- Advanced Python features -- Decorators -- Generators -- Summary -- Activity -- Part 2: Python in Offensive Web Security -- Chapter 3: An Introduction to Web Security with Python -- Fundamentals of web security -- Python tools for a web vulnerability assessment -- Wapiti -- MITMProxy -- SQLMap -- Exploring web attack surfaces with Python -- HTTP header analysis -- HTML analysis…”
    Libro electrónico
  7. 8107
    por Arhippainen, Heikki
    Publicado 2004
    Tabla de Contenidos: “…Refining the browser interface -- 7.1 Why enhance the WebFacing user interface -- 7.2 Techniques to extend the generated Web application -- 7.2.1 Ways to control the appearance of command key buttons -- 7.3 Selecting and customizing the WebFacing style -- 7.3.1 Choosing a WebFacing style when creating a new WebFacing project -- 7.3.2 Creating your own style -- 7.3.3 Modifying the chrome area -- 7.3.4 Managing the WebFacing styles -- 7.4 Modifying the appearance of the application area -- 7.5 WebFacing properties -- 7.5.1 Conversion time properties -- 7.5.2 Run-time properties -- 7.5.3 Style properties -- 7.6 Modifying static Web pages -- 7.6.1 Changing the layout of the launch page (index.html) -- 7.6.2 Customizing the signon window -- 7.7 Changing record JSPs with Page Designer -- 7.7.1 Where record JSPs are located -- 7.8 Customizing the Web user interface through Web Settings…”
    Libro electrónico
  8. 8108
    por Basu, S. K.
    Publicado 2009
    Tabla de Contenidos: “…4.4.6 Distinction Between Internal Audit and External Audit -- 4.4.7 Reliance upon the Work of an Internal Auditor -- 4.4.8 Evaluation of Internal Audit Function -- 4.5 Auditor's Independence -- 4.5.1 Advantages of Independent Audit -- 4.5.2 Provisions for Safeguarding Independent Auditors -- 4.5.3 Important Aspects of Auditor's Independence -- 4.6 Distinction Between Internal Check, Internal Audit and Internal Control -- 4.7 Case Studies -- Chapter 5: Vouching -- 5.1 Meaning of Vouching -- 5.2 Objectives of Vouching -- 5.3 Importance of Vouching -- 5.4 Vouching and Verification -- 5.5 Vouching and Routine Checking -- 5.6 Concept of Voucher -- 5.7 Internal and External Evidence -- 5.8 General Principles of Vouching -- 5.9 Teeming and Lading: A Challenge to Vouching -- 5.10 Vouching of Different Types of Transactions -- Chapter 6: Verification and Valuation of Assets and Liabilities -- 6.1 Introduction -- 6.2 Meaning of Verification of Assets -- 6.3 Meaning of Valuation of Assets -- 6.4 Difference Between Verification and Valuation -- 6.5 Importance of Verification of Assets -- 6.6 Importance of Valuation of Assets -- 6.7 General Principles for Verification of Assets -- 6.8 Problems of Verification -- 6.9 Problems of Valuation -- 6.10 Window Dressing-A Challenge to Verification -- 6.11 Verification and Valuation of Assets -- 6.12 Verification and Valuation of Intangible Assets -- 6.12.1 Goodwill -- 6.12.2 Patent -- 6.12.3 Copyright -- 6.12.4 Trade Marks -- 6.13 Verification and Valuation of Fixed Assets -- 6.13.1 Land and Buildings -- 6.13.2 Building -- 6.13.3 Plant and Machinery -- 6.13.4 Furniture and Fixtures -- 6.13.5 Motor Vehicles -- 6.13.6 Assets Acquired Under Hire Purchase System -- 6.14 Audit of Depreciation -- 6.14.1 Legal Necessity of a Provision for Depreciation -- 6.14.2 Provision for Depreciation for Past Years…”
    Libro electrónico
  9. 8109
    Publicado 2020
    Tabla de Contenidos: “…Image and Its Properties -- 3.1 Introduction -- 3.2 Image and Its Properties -- 3.2.1 Bit-Depth -- 3.2.2 Pixel and Voxel -- 3.2.3 Image Histogram -- 3.2.4 Window and Level -- 3.2.5 Connectivity: 4 or 8 Pixels -- 3.3 Image Types -- 3.3.1 JPEG -- 3.3.2 TIFF -- 3.3.3 DICOM -- 3.4 Data Structures for Image Analysis -- 3.5 Reading, Writing and Displaying Images -- 3.5.1 Reading Images -- 3.5.2 Reading DICOM Images using pyDICOM -- 3.5.3 Writing Images -- 3.5.4 Writing DICOM Images using pyDICOM -- 3.5.5 Displaying Images -- 3.6 Programming Paradigm -- 3.7 Summary -- 3.8 Exercises -- Part II: Image Processing using Python -- 4. …”
    Libro electrónico
  10. 8110
    por Gavin, Lee
    Publicado 2005
    Tabla de Contenidos: “…Local versus remote deployment -- 10.1 Overview of adapter deployment -- 10.2 Local deployment -- 10.2.1 Configuring startup in the Windows environment -- 10.2.2 Configuring startup in a UNIX environment -- 10.3 Remote deployment…”
    Libro electrónico
  11. 8111
    Publicado 2022
    Tabla de Contenidos: “…IDS Usage Contract Language -- 7.3.2 Usage Control Dimensions -- 7.3.3 Operators for Usage Control Rules -- 7.4 The Policy Information Point -- 7.5 The Participant Information Service (ParIS) -- 7.6 Conclusion: The IDS-IM as the Bridge Between Expressions, Infrastructure, and Enforcement -- References -- Chapter 8: Data Usage Control -- 8.1 Introduction -- 8.2 Usage Control -- 8.2.1 Access Control -- 8.2.2 Usage Control -- 8.2.3 Usage Control Components and Communication Flow -- 8.2.4 Specification, Management, and Negotiation -- 8.2.5 Related Concepts -- 8.2.5.1 Data Leak/Loss Prevention -- 8.2.5.2 Digital Rights Management -- 8.2.5.3 User Managed Access -- 8.2.5.4 Windows Information Protection -- 8.3 Usage Control in the IDS -- 8.3.1 Usage Control Policies -- 8.3.1.1 Policy Classes -- 8.3.1.2 Policy Negotiation -- 8.3.2 Usage Control Technologies -- 8.3.2.1 Integration Concept…”
    Libro electrónico
  12. 8112
    por Basu, S. K.
    Publicado 2005
    Tabla de Contenidos: “…6.8 Problems in Verification -- 6.9 Problems in Valuation -- 6.10 Window Dressing-A Challenge to Verification -- 6.11 Verification and Valuation of Assets -- 6.12 Verification and Valuation of Intangible Assets -- 6.12.1 Goodwill -- 6.12.2 Patent -- 6.12.3 Copyright -- 6.12.4 Trademarks -- 6.13 Verification and Valuation of Fixed Assets -- 6.13.1 Land and Buildings -- 6.13.2 Building -- 6.13.3 Plant and Machinery -- 6.13.4 Furnitures and Fixtures -- 6.13.5 Motor Vehicles -- 6.13.6 Assets Acquired under Hire Purchase System -- 6.14 Verification and Valuation of Investments -- 6.14.1 Quoted Investments -- 6.14.2 Unquoted Investments -- 6.15 Verification and Valuation of Current Assets -- 6.15.1 Stock-in-trade -- 6.15.2 Work-in-Progress -- 6.15.3 Sundry Debtors -- 6.15.4 Bills Receivables -- 6.15.5 Cash at Bank -- 6.15.6 Cash-in-hand -- 6.15.7 Prepaid Expenses -- 6.16 Verification and Valuation of Fictitious Assets -- 6.16.1 Preliminary Expenses -- 6.16.2 Discount on Issue of Shares or Debentures -- 6.17 Verification and Valuation of Contingent Assets -- 6.18 Verification and Valuation of Liabilities -- 6.19 Verification and Valuation of Fixed or Long Term Liabilities -- 6.19.1 Debentures -- 6.19.2 Secured Long Term Loans -- 6.20 Verification and Valuation of Current Liabilities -- 6.20.1 Sundry Creditors -- 6.20.2 Bills Payable -- 6.20.3 Bank Overdraft -- 6.20.4 Provision for Taxation -- 6.20.5 Outstanding Liabilities for Expenses -- 6.21 Verification and Valuation of Contingent Liabilities -- 6.22 Events Occurring after the Balance Sheet Date -- 6.22.1 Adjusting Events -- 6.22.2 Non-adjusting Events -- 6.22.3 Other Events -- 6.23 Prior Period and Extraordinary Items and Changes in Accounting Policies -- Points to Ponder -- Review Questions -- Chapter 7: Depreciation -- 7.1 Definition of Depreciation -- 7.2 Purposes of Providing Depreciation…”
    Libro electrónico
  13. 8113
    por Engelmann, Sven
    Publicado 2023
    Tabla de Contenidos: “…11.3 REINFORCEMENT METHODS FOR BATHTUBS -- Chapter 12 Thermoforming and Milling of Large-Scale Formed Parts (Sheet Machine) -- 12.1 SURFACE PROBLEMS -- 12.1.1 The Avoidance of Chill Marks -- 12.2 MOLD SHRINKING AND FREE SHRINKAGE -- 12.3 EXPANSION -- 12.4 THE DECISION BETWEEN POSITIVE OR NEGATIVE FORMING -- 12.5 TWIN-SHEET FORMING -- 12.6 AUTOMATION -- 12.6.1 Comparison of Semi-Automatic and Fully Automatic Thermoforming Lines -- 12.6.2 Further Treatment of Large-Scale Thermoformed Parts -- Chapter 13 Changeover of Sheet Machines -- 13.1 THE INCREASING IMPORTANCE OF THE CHANGEOVER PROCEDURE -- 13.1.1 Quick Clamping System for Molds -- 13.1.2 The Infinitely Adjustable Clamping Frame -- 13.1.3 The Infinitely Adjustable Window Plate System -- 13.1.4 Quick and Efficient Heating (Halogen Heater Elements) -- 13.1.5 The Programmable Axes -- 13.1.6 Mold Change Machine -- 13.2 SHORTENING OF CHANGEOVER WITH HIGH-QUALITY EQUIPMENT -- Chapter 14 Chromed Parts -- Chapter 15 Applications in Aircraft and Mass Transportation -- 15.1 CURRENT GOVERNMENT AND OEM SPECIFICATIONS FOR FLAMMABILITY -- 15.1.1 FAR 25.853a, i and ii -- 15.1.2 FAR 25.853d -- 15.1.3 Toxicity -- 15.2 USE OF ACRYL/PVC -- 15.3 POLYCARBONATE -- 15.3.1 Broad Compliance -- 15.3.2 Outstanding Aesthetics -- 15.3.3 Low Weight -- 15.3.4 Improved Processing and Part Design -- 15.3.5 An Expanding Range of Applications -- 15.3.6 Case Study3 -- 15.4 POLYETHERIMIDE (PEI) -- 15.4.1 PEI Sheets for Aircraft and Passenger Train Interiors4 -- 15.5 POLYPHENYLSULFONE (PPSU) -- Chapter 16 High-Quality and Fully Transparent Products (Sheet Machines) -- 16.1 THICK AND SELF-SUPPORTING CLASS-A FORMED PARTS -- 16.2 CLASS-A MOLDED PARTS FOR IN-MOLD DECORATION -- 16.3 DEVELOPMENT OF FULLY TRANSPARENT PRODUCTS -- 16.3.1 Material -- 16.3.2 Creation of the Environment -- Chapter 17 Deco Molding and Multi-deco Molding…”
    Libro electrónico
  14. 8114
    Publicado 2022
    Tabla de Contenidos: “…3.2 Deep learning approaches for digital signal processing -- 3.3 Optical IM/DD systems based on deep learning -- 3.3.1 ANN receiver -- 3.3.1.1 PAM transmission -- 3.3.1.2 Sliding window FFNN processing -- 3.3.2 Auto-encoders -- 3.3.2.1 Auto-encoder design based on a feed-forward neural network -- 3.3.2.2 Auto-encoder design based on a recurrent neural network -- 3.3.3 Performance -- 3.3.4 Distance-agnostic transceiver -- 3.4 Implementation on a transmission link -- 3.4.1 Conventional PAM transmission with ANN-based receiver -- 3.4.2 Auto-encoder implementation -- 3.5 Outlook -- References -- 4 Machine learning techniques for passive optical networks -- 4.1 Background -- 4.2 The validation of NN effectiveness -- 4.3 NN for nonlinear equalization -- 4.4 End to end deep learning for optimal equalization -- 4.5 FPGA implementation of NN equalizer -- 4.6 Conclusions and perspectives -- References -- 5 End-to-end learning for fiber-optic communication systems -- 5.1 Introduction -- 5.2 End-to-end learning -- 5.3 End-to-end learning for fiber-optic communication systems -- 5.3.1 Direct detection -- 5.3.2 Coherent systems -- 5.3.2.1 Nonlinear phase noise channel -- 5.3.2.2 Perturbation models (NLIN and GN) -- 5.3.2.3 Split-step Fourier method (SSFM) -- 5.4 Gradient-free end-to-end learning -- 5.5 Conclusion -- Acknowledgments -- References -- 6 Deep learning techniques for optical monitoring -- 6.1 Introduction -- 6.2 Building blocks of deep learning-based optical monitors -- 6.2.1 Digital coherent reception as a data-acquisition method -- 6.2.2 Deep learning and representation learning -- 6.2.3 Combination of digital coherent reception and deep learning -- 6.3 Deep learning-based optical monitors -- 6.3.1 Training mode of DL-based optical monitors -- 6.3.2 Advanced topics for the training mode of DL-based optical monitors…”
    Libro electrónico
  15. 8115
    Publicado 2018
    Tabla de Contenidos: “…5.1.2.1 Cyclic Pre x OFDM -- 5.1.2.2 Windowed OFDM -- 5.1.2.3 Filtered OFDM -- 5.1.2.4 Universally Filtered OFDM -- 5.1.3 Filter Bank-Based Waveforms -- 5.1.3.1 FBMC-OQAM -- 5.1.3.2 FBMC-QAM -- 5.2 Single Carrier DFTS-OFDM -- 5.3 Waveform Design Requirements for 5G NR -- 5.4 Key Performance Indicator for NR Waveform Design -- 5.5 Waveform Comparison for NR -- 5.5.1 Frequency Localization -- 5.5.2 Power Ef ciency -- 5.5.3 Time-Varying Fading Channel -- 5.5.4 Baseband Complexity -- 5.5.4.1 CP-OFDM -- 5.5.4.2 W-OFDM -- 5.5.4.3 UF-OFDM -- 5.5.4.4 FBMC-OQAM -- 5.5.5 Phase-Noise Robustness Comparison -- 5.5.5.1 Phase-Noise Effect in OFDM -- 5.5.5.2 Phase-Noise Effect in FBMC-QAM -- 5.5.5.3 Phase-Noise Effect in FBMC-OQAM -- References -- 6 NR Waveform -- 6.1 Suitability of OFDM for NR -- 6.2 Scalable OFDM for NR -- 6.2.1 Why 15 kHz as Baseline Numerology? …”
    Libro electrónico
  16. 8116
    Publicado 2010
    “…Learn to create basic software applications with the Processing language Make your own drawing and animation tools Create a GUI (Graphical User Interface) to control your software Work with an Arduino microcontroller to provide the physical controls for your drawing and animation tools Work with Mac OS X, Linux, or a Windows PC with Windows XP or Windows 7…”
    Video
  17. 8117
    Publicado 2014
    “… • Use ConfigMgr 2012 R2 with Windows Intune to deliver people-centric management to any user, any device, anywhere • Simplify BYOD registration and enrollment, and enable consistent access to corporate resources • Integrate new mobile device management capabilities into the Configuration Manager console without service packs, hot fixes, or major releases • Provision authentication certificates for managed devices via certificate profiles • Automate repetitive software- and device-related tasks with PowerShell cmdlets • Centrally control roaming profiles, certificates, Wi-Fi profiles, and VPN configuration • Configure User Data and Profiles to manage folder redirection, offline files/folders, and roaming profiles for Windows 8.x users • Enable users to access data in Virtual Desktop Infrastructure (VDI) environments • Manage devices running OS X, UNIX, Linux, Windows Phone 8, WinRT, iOS, and Android • Understand the new cross-platform agent introduced in ConfigMgr 2012 R2 • Automate Windows setup with OSD • Prepare for, configure, install, and verify successful installation of the Windows Intune connector role • Respond to emerging challenges in mobile device management…”
    Libro electrónico
  18. 8118
    por Yates-Doerr, Emily, 1978-
    Publicado 2024
    “…Policy makers speak about how a critical window of biological growth around the time of pregnancy--called the "first 1,000 days of life"--determines health and wealth across the life course. …”
    Libro electrónico
  19. 8119
    Publicado 2015
    “…Succeed with comprehensive learning and practice tests Master the NCLEX-PN® exam materials in all tested subject areas Prepare with four comprehensive practice tests Analyze your test readiness and areas for further study with topic-focused chapter tests Learn important test-taking strategies to maximize your score and diminish your anxiety Pearson IT Certification Practice Test minimum system requirements: Windows XP (SP3), Windows Vista (SP2), Windows 7, or Windows 8 Professional; Microsoft .NET Framework 4.0 Client; Pentium class 1GHz processor (or equivalent); 512 MB RAM; 650 MB hard disk space plus 50 MB for each downloaded practice exam ; access to the Internet to register and download xam databases NCLEX-RN® and NCLEX-PN® are registered trademarks of the National Council of State Boards of Nursing, Inc. …”
    Libro electrónico
  20. 8120
    Publicado 2006
    “…2.2 Upgrade tips and information 2.3 Switching from other GNU/Linux distributions 2.4 Switching from Microsoft Windows 2.5 Preinstall checklist 2.6 Booting from the installation media 2.7 Installer configuration options 2.8 Drive partitioning 2.9 Selecting software packages 2.10 Finalizing your settings 2.11 Hostname, Root Password, Networking, and Users 2.12 Release notes 2.13 Graphics, printers, and sound card configuration 2.14 First boot 3 Post-install configuration 3.1 Configuring your computer with YaST and SaX 3.2 Networking and modems 3.3 Installation sources 3.4 Staying up to date 3.5 Installing the ATI video driver 3.6 Installing the Nvidia video driver 3.7 DVD video playback for 32-bit systems 3.8 DVD video playback for 64-bit systems 3.9 Playing Windows media files 3.10 Adding more software 3.11 Enhancing your graphics with XGL and Compiz 3.12 Printing 3.13 Sound configuration 3.14 Setting up email 4 Transferring data from Microsoft Windows 4.1 Mass transfer of data and settings from Microsoft Windows 4.2 Data destinations: where to put your files 4.3 Moving old email from Windows 4.4 Moving system fonts from Windows 4.5 Using MS Office documents in SUSE 10.1 5 Where to go for help 5.1 Web links 5.2 Related books and further reading…”
    Libro electrónico