Mostrando 665,721 - 665,740 Resultados de 668,645 Para Buscar 'C5N~', tiempo de consulta: 2.19s Limitar resultados
  1. 665721
    por Goncalvès, Dominique
    Publicado 2020
    “…Dans les années 1820, bien que ces aristocrates soient de plus en plus fragilisés par leur endogamie et par la concurrence des commerçants, ils seront un frein à l’évolution de Cuba vers l’indépendance. …”
    Electrónico
  2. 665722
    Publicado 2014
    Tabla de Contenidos: “…L'anthropologie médiévale: un cadre de référence jamais mis en cause -- La perversion du modèle anthropologique de référence: L'amador -- La tragédie ontologique du moi -- Conclusion: La sublimation poétique de la superbe du moi…”
    Libro electrónico
  3. 665723
    Publicado 1999
    “…Distributed database environments offer a number of benefits over single- database systems, including: This book describes how you can use multiple databases and the distributed features of Oracle to best advantage. …”
    Libro electrónico
  4. 665724
    Publicado 2002
    “…These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002…”
    Libro electrónico
  5. 665725
    por Spangler, Scott, Kreulen, Jeffrey
    Publicado 2008
    “…Identify your key information sources and what can be learned about them Discover the underlying structure inherent in your unstructured information Create flexible models that capture both domain knowledge and business objectives Create visual taxonomies: “pictures” of your data and its key interrelationships Combine structured and unstructured information to reveal hidden trends, patterns, and relationships Gain insights from “informal talk” by customers and employees Systematically leverage knowledge from technical literature, patents, and the Web Establish a sustainable process for creating continuing business value from unstructured data Preface xv Acknowledgements xx Chapter 1: Introduction 1 Chapter 2: Mining Customer Interactions 21 Chapter 3: Mining the Voice of the Customer 71 Chapter 4: Mining the Voice of the Employee 93 Chapter 5: Mining to Improve Innovation 111 Chapter 6: Mining to See the Future 133 Chapter 7: Future Applications 163 Appendix: The IBM Unstructured Information Modeler Users Manual 171…”
    Libro electrónico
  6. 665726
    Publicado 2006
    Tabla de Contenidos: “…Ethical Choice -- Chapter 4. Competence -- Chapter 5. Developing and Maintaining Client Trust -- Chapter 6. …”
    Libro electrónico
  7. 665727
    por Taylor, James, 1965-
    Publicado 2007
    “…Short cut…”
    Libro electrónico
  8. 665728
    Publicado 2006
    “…Foreword to the Paperback Edition xxiii Preface: What’s Past Is Prologue xxvii Introduction: The Wizard of Aaaahs xxix Chapter One: You and Your Audience 3 Chapter Two: The Power of the WIIFY 15 Chapter Three: Getting Creative: The Expansive Art of Brainstorming 27 Chapter Four: Finding Your Flow 51 Chapter Five: Capturing Your AudienceImmediately 83 Chapter Six: Communicating Visually 109 Chapter Seven: Making the Text Talk 123 Chapter Eight: Making the Numbers Sing 143 Chapter Nine: Using Graphics to Help Your Story Flow 157 Chapter Ten: Bringing Your Story to Life 189 Chapter Eleven: Customizing Your Presentation 215 Chapter Twelve: Pitching in the Majors 231 Chapter Thirteen: Animating Your Graphics 237 Chapter Fourteen: The Virtual Presentation 257 Appendix A: Tools of the Trade 273 Appendix B: Presentation Checklists 277 Acknowledgments 283 Index 287…”
    Libro electrónico
  9. 665729
    Publicado 2007
    “…Companies for whom “loyalty” isn’t just real: it’s palpable, and driving unbeatable advantages in everything from marketing to recruitment. …”
    Libro electrónico
  10. 665730
    Publicado 2005
    “…Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. …”
    Libro electrónico
  11. 665731
    por Weltman, Rob, 1953-
    Publicado 2000
    “…Once you have become proficient with the essential concepts and techniques, you can move on to detailed material about authentication, LDAP and JavaScript (TM) , working with JavaBeans (TM) for reusable LDAP components, expressing data relationships in a directory, and other advanced LDAP subjects. …”
    Libro electrónico
  12. 665732
    Publicado 2006
    “…Companion Web site at www.realworlddigitalaudio.com includes interviews with audio professionals, updated information, and more. …”
    Libro electrónico
  13. 665733
    Publicado 2004
    “…Drawing on 20 years’ experience as a shell programming instructor, Quigley guides you through every facet of programming all leading UNIX/Linux shells: bourne, bash, korn, C, and tcsh. Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. …”
    Libro electrónico
  14. 665734
    Publicado 2004
    “…Consider this book your pit crew, helping you find easier, faster, and better ways of using the Finder, the Dock, the assortment of programs that come with Mac OS X, and a bunch of programs that don't. And if you want to become your own master mechanic, it also includes two rich chapters on Unix, the engine under Mac OS X's hood. …”
    Libro electrónico
  15. 665735
    Publicado 2004
    “…From Jonathan Robie's introductory "XQuery: A Guided Tour" to Mary Mary Fernández, Jérôme Siméon, and Philip Wadler's "Introduction to the Formal Semantics," XQuery is revealed in a way that both novice programmers and industry experts can appreciate. Edited by long-time XML expert and programmer Howard Katz, coverage ranges from strictly technical chapters to comparative essays such as Michael Kay's "XQuery, XPath, and XSLT," which explores the common ancestry of all three languages, and Don Chamberlin's "Influences on the Design of XQuery," which details the process behind XQuery's design. …”
    Libro electrónico
  16. 665736
    Publicado 2002
    “…With Programming Visual Basic for the Palm OS , Visual Basic programmers can become Palm programmers almost over night…”
    Libro electrónico
  17. 665737
    Publicado 2008
    “…Coverage includes How to design software in a more natural, evolutionary, and professional way How to use the “open-closed” principle to mitigate risks and eliminate waste How and when to test your design throughout the development process How to translate design principles into practices that actually lead to better code How to determine how much design is enough How refactoring can help you reduce over-design and manage change more effectively The book’s companion Web site, www.netobjectives.com/resources, provides updates, links to related materials, and support for discussions of the book’s content…”
    Libro electrónico
  18. 665738
    Publicado 2008
    “…--David "LetsKillDave" Weller, CEO, Cogito Ergonomics, LLC, and former XNA program manager…”
    Libro electrónico
  19. 665739
    Publicado 2006
    “…Table of Contents Welcome to the Blogosphere A general discussion on blogs--what they are, how they work, and why people blog Introducing the New Version of Blogger Introduction to Blogger; discussion of the new and changed features in the new version of Blogger Launching Your First Blog Detailed step-by-step instructions on how to create a Blogger blog Creating New Blog Posts Posting from the Blogger dashboard, posting from the Google toolbar, categorizing your posts with labels Multimedia and Mobile Blogging Including photos, feeds, and other media in your posts; mobloging from mobile phones Managing Your Blog Using the Dashboard to manage your blog, controlling who can read your blog, creating a private blog, managing comments, examining blog usage statistics Customizing Your Blog Choosing new Blogger templates, customizing templates, adding new page elements, coding non-standard elements with HTML Hosting Your Own Blog Detailed instructions on how to host a Blogger blog on your own website; also covers how to assign a dedicated domain or URL to your blog Syndicating Your Blog Adding RSS and Atom feeds, syndicating the feed, customizing your feed for individual posts or comments Making Money from Your Blog Adding Google AdSense and other advertising to your blog…”
    Libro electrónico
  20. 665740
    por St. John, Noah, 1967-
    Publicado 2009
    “…The problem isn't lack of motivation or lack of information. …”
    Libro electrónico