Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Misales 1,727
- Derecho civil 1,580
- Historia 1,406
- Derecho penal 1,399
- Liturgia 1,180
- Derecho administrativo 1,039
- Filosofía 929
- Engineering & Applied Sciences 912
- Església Catòlica 904
- Development 864
- Teología dogmática 803
- Application software 791
- Derecho 758
- Tratados y manuales 748
- Litúrgia 735
- Psicología 712
- Derecho mercantil 710
- Teología 701
- Derecho constitucional 689
- Mental illness 687
- Economía 657
- Operating systems (Computers) 646
- Moral cristiana 623
- Computer Science 612
- Enfermedades mentales 611
- Universidad Pontificia de Salamanca (España) 583
- Computer programs 548
- Derecho canónico 547
- Mental health 546
- Personas con discapacidad mental 534
-
124781por Palafox y Mendoza, Juan Obispo de OsmaTabla de Contenidos: “…Tratados espirituales: Año espiritual ; Manual de estados ; Semanas espirituales ; Egercicios devotos à la Virgen ; Pastor de Noche Buena, &c . -- V . 8 . …”
Publicado 1762
Libro -
124782por Braun, DanielTabla de Contenidos: “…Intro -- Impressum -- Einleitung -- E.1 Programmieren lernen in 14 Tagen -- E.2 Der Aufbau des Buches -- E.3 Programmtexte und Lösungen zum Download -- E.4 Fragen und Feedback -- 1 Erste Schritte mit Java -- 1.1 Programmiersprachen -- 1.2 Besonderheiten von Java -- 1.3 Installation und Einrichtung -- 1.3.1 Linux -- 1.3.2 macOS -- 1.3.3 Windows -- 1.3.4 Installation testen -- 1.4 Entwicklungsumgebungen -- 1.4.1 Eclipse -- 1.4.2 IntelliJ IDEA -- 2 Das erste Programm - »Hallo Welt!…”
Publicado 2022
Libro electrónico -
124783Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: Downloading and Installing Unity -- Game engine overview -- Game engines for specific game genres -- First-person shooters (FPS) -- Third-person games -- Other game genres -- Available 3D game engines -- CryENGINE -- Lumberyard -- Microsoft's XNA Game Studio -- Unreal game engine -- Unity - past, present, and future -- Version 1.0 - 2005 -- Version 2.0 - 2007 -- Version 3.0 - 2010 -- Version 4.0 - 2012 -- Version 5.0 - 2015 -- Version 2017 - 2017 -- Version 2018 - 2018 -- The case for Unity -- Unity features -- Editor -- Graphics -- Unity community -- System requirements -- Development system requirements -- Playback system requirements -- Downloading Unity -- Installing Unity -- Summary -- Chapter 2: The Unity Interface -- Screen real estate -- Menu -- Unity -- File -- Edit -- Assets -- GameObject -- Component -- Window -- Help -- Scene view -- Game view -- Project window -- Hierarchy window -- Inspector window -- Toolbar -- Transform tools -- Gizmo Toggles -- Cloud and Account Buttons -- Layers and Layouts -- Layouts -- Summary -- Chapter 3: Designing the Game -- Game concept -- Game idea -- Input controls -- Winning and losing -- Game characters -- Cucumber Man -- Cucumber Beetle -- Gameplay -- Game world layout -- Starting condition -- Point system -- Heads-Up Display -- The difficulty balance -- Difficulty balance questions -- Implementation plan -- Project organization -- Custom assets -- Standard assets -- Organization -- Summary -- Chapter 4: Creating Our Terrain -- Creating the terrain -- Working with height maps -- Importing the terrain -- Shaping the terrain -- Smoothing our terrain -- Creating our spawn points -- Painting the terrain -- Adding water -- Saving your work -- Adding vegetation -- Summary…”
Libro electrónico -
124784Publicado 2018Tabla de Contenidos: “…Going from forRoot() to forFeature() -- Setting up forFeature() from string to selection function -- Introducing NgRx types for setting up the state -- Giving forFeature() a type -- Several states in the same feature module -- Adding the counter-list reducer -- Adding the component -- Adding the constants -- Adding the action methods -- Adding the model -- Register our reducers -- Component architecture -- @ngrx/store-devtools - debugging -- @ngrx/effects - working with side effects -- Installing and setting it up -- Creating our first effect - a realistic scenario -- Creating our constants -- Action creators -- Reducer with a new type of default state -- The effect - listening to a specific dispatched action -- Adding a component - introducing selectors -- Extending our example with the create effect -- Updating the constants file -- Updating the reducer -- Additional actions -- Adding another effect -- Supporting the effect in our component -- Running a demo of the app -- Summary -- Chapter 10: NgRx - In Depth -- @ngrx/entity -- Setting it up -- Selecting our data -- Adding the full CRUD -- Creating users -- Updating users -- Deleting users -- @ngrx/router-store -- Installation and set up -- Investigating the router state -- Custom serialization -- Navigating through dispatch -- Understanding NgRx - building our own micro implementation -- Adding a store -- Merging the states in a better way -- Implementing a reducer and integrating it with the store -- Dealing with slices of state -- Handling side effects -- @ngrx/schematics -- Setting it up -- Generating constructs -- Generating actions -- Generating a container -- Generating an effect -- Generating an entity -- Generating a feature -- Generating a reducer -- Generating a store -- Summary -- Other Books You May Enjoy -- Index…”
Libro electrónico -
124785Publicado 2017Tabla de Contenidos: “…-- Configuring the Cisco Sourcefire IDS to send log data to the OSSIM server -- Router and switch logs -- Configuring Cisco IOS to log to the syslog service of the OSSIM server -- Operating system logs -- Collecting logs from a Windows system -- Installing and configuring NXLog CE across your Windows hosts -- Application logs -- Reading an application log file with an HIDS agent on Windows -- Network visibility -- Summary -- Chapter 9: ICS Computer Security -- Endpoint hardening -- Narrowing the attack surface -- Limiting the impact of a compromise -- Microsoft Enhanced Mitigation Experience Toolkit& -- #160 -- -- Configuring EMET for a Rockwell Automation application server -- Microsoft AppLocker -- Microsoft AppLocker configuration -- Configuration and change management -- Patch management -- Configuring Microsoft Windows Server Update Services for the industrial zone -- Configuring the Cisco ASA firewall -- Creating the Windows Server Update Services server -- Configuring Windows client computers to get updates from the WSUS server -- Endpoint protection software -- Host-based firewalls -- Anti-malware software -- Types of malware -- Application whitelisting software -- Application whitelisting versus blacklisting -- How application whitelisting works -- Symantec's Embedded Security: Critical system protection…”
Libro electrónico -
124786Publicado 2018Tabla de Contenidos: “…-- Variables in Elixir -- Immutability in Elixir -- Understanding the different types in Elixir -- Getting more information with the i helper -- Getting more information with the h helper -- Using IEx and helpers to understand types -- Your objects have no power here -- Introduction to Phoenix -- Installing Phoenix 1.3 -- Creating a new Phoenix project -- Running the Phoenix Mix Task -- Running the Phoenix server for the first time -- Phoenix's default application structure -- Configuration files -- Assets files -- Private files -- Tests -- Other directories -- The most important directory: lib -- A note about how data flows in Phoenix -- Summary -- Chapter 2: Building Controllers, Views, and Templates -- Understanding the flow of Phoenix connections -- Creating our Social Voting project -- Creating a poll controller -- Understanding the controller's structure -- Building the poll controller -- Understanding templates -- Passing data to our templates -- Writing controller tests -- Understanding the code behind tests -- Writing the poll controller test -- Summary -- Chapter 3: Storing and Retrieving Vote Data with Ecto Pages -- Understanding the role of schemas -- Creating a new migration -- Creating the Polls table migration -- Creating our Options table migration -- Creating our Poll schema -- Testing our Poll schema -- Creating our Option schema -- Understanding the gotchas of associations -- Understanding the role of contexts -- Creating a Votes context -- Grabbing a list of data -- Understanding Ecto query writing -- Hooking up the context to our controller -- Creating a new poll -- Creating the new action in the controller…”
Libro electrónico -
124787Publicado 2021Tabla de Contenidos: “…Common Pitfalls -- Common Cloud Vulnerabilities -- Describe the Secure Software Development Lifecycle Process -- NIST Secure Software Development Framework -- OWASP Software Assurance Security Model -- Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Lifecycle -- Avoid Common Vulnerabilities During Development -- Cloud-Specific Risks -- Quality Assurance -- Threat Modeling -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional Testing -- Security Testing Methodologies -- Use Verified Secure Software -- Approved Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-On -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Domain 5 Cloud Security Operations -- Implement and Build Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems…”
Libro electrónico -
124788Publicado 2021Tabla de Contenidos: “…Intro -- Table of Contents -- About the Author -- About the Technical Reviewers -- Acknowledgments -- Introduction -- Chapter 1: Introduction to Apache Spark -- Overview -- History -- Spark Core Concepts and Architecture -- Spark Cluster and Resource Management System -- Spark Applications -- Spark Drivers and Executors -- Spark Unified Stack -- Spark Core -- Spark SQL -- Spark Structured Streaming -- Spark MLlib -- Spark GraphX -- SparkR -- Apache Spark 3.0 -- Adaptive Query Execution Framework -- Dynamic Partition Pruning (DPP) -- Accelerator-aware Scheduler -- Apache Spark Applications -- Spark Example Applications -- Apache Spark Ecosystem -- Delta Lake -- Koalas -- MLflow -- Summary -- Chapter 2: Working with Apache Spark -- Downloading and Installation -- Downloading Spark -- Installing Spark -- Spark Scala Shell -- Spark Python Shell -- Having Fun with the Spark Scala Shell -- Useful Spark Scala Shell Command and Tips -- Basic Interactions with Scala and Spark -- Basic Interactions with Scala -- Spark UI and Basic Interactions with Spark -- Spark UI -- Basic Interactions with Spark -- Introduction to Collaborative Notebooks -- Create a Cluster -- Create a Folder -- Create a Notebook -- Setting up Spark Source Code -- Summary -- Chapter 3: Spark SQL: Foundation -- Understanding RDD -- Introduction to the DataFrame API -- Creating a DataFrame -- Creating a DataFrame from RDD -- Creating a DataFrame from a Range of Numbers -- Creating a DataFrame from Data Sources -- Creating a DataFrame by Reading Text Files -- Creating a DataFrame by Reading CSV Files -- Creating a DataFrame by Reading JSON Files -- Creating a DataFrame by Reading Parquet Files -- Creating a DataFrame by Reading ORC Files -- Creating a DataFrame from JDBC -- Working with Structured Operations -- Working with Columns -- Working with Structured Transformations…”
Libro electrónico -
124789Computers for seniors for dummiesComputers For Seniors For DummiesPublicado 2022Tabla de Contenidos: “…-- Choose the Right Printer -- Unpack and Install a New Printer -- Set Up a Printer to Work with Windows -- Set a Default Printer -- Set Printer Preferences -- Manage a Print Queue -- Remove a Printer -- Part 2 Getting Up to Speed with Windows -- Chapter 4 Working with Apps in Windows -- Learn the Names of Things -- Start an App -- Exit an App -- Find Your Way Around in a Desktop App -- Find Your Way Around in a Microsoft Store App -- Work with a Window -- Switch among Running Apps -- Move and Copy Data between Apps -- Install New Apps -- Remove Apps -- Chapter 5 Six Great Apps that Come with Windows -- Do the Math with the Calculator App -- Write Brilliant Documents with WordPad -- Jot Quick Notes with Notepad -- Set Alarms and Timers -- Keep Up on the Weather -- Save Time with Cortana…”
Libro electrónico -
124790Publicado 2022Tabla de Contenidos: “…-- Mono audio -- Adjust AirPods options -- Finally, the Accessibility Shortcut -- Part 2 Beginning to Use Your Apple Watch -- Chapter 5 What Time Is It? …”
Libro electrónico -
124791Publicado 2022Tabla de Contenidos: “…Business Requirements -- Phases and Methodologies -- Apply the Secure Software Development Life Cycle -- Cloud-Specific Risks -- Threat Modeling -- Avoid Common Vulnerabilities during Development -- Secure Coding -- Software Configuration Management and Versioning -- Apply Cloud Software Assurance and Validation -- Functional and Non-functional Testing -- Security Testing Methodologies -- Quality Assurance -- Abuse Case Testing -- Use Verified Secure Software -- Securing Application Programming Interfaces -- Supply-Chain Management -- Third-Party Software Management -- Validated Open-Source Software -- Comprehend the Specifics of Cloud Application Architecture -- Supplemental Security Components -- Cryptography -- Sandboxing -- Application Virtualization and Orchestration -- Design Appropriate Identity and Access Management Solutions -- Federated Identity -- Identity Providers -- Single Sign-on -- Multifactor Authentication -- Cloud Access Security Broker -- Summary -- Chapter 5 Cloud Security Operations -- Build and Implement Physical and Logical Infrastructure for Cloud Environment -- Hardware-Specific Security Configuration Requirements -- Installation and Configuration of Virtualization Management Tools -- Virtual Hardware-Specific Security Configuration Requirements -- Installation of Guest Operating System Virtualization Toolsets -- Operate Physical and Logical Infrastructure for Cloud Environment -- Configure Access Control for Local and Remote Access -- Secure Network Configuration -- Operating System Hardening through the Application of Baselines -- Availability of Stand-Alone Hosts -- Availability of Clustered Hosts -- Availability of Guest Operating Systems -- Manage Physical and Logical Infrastructure for Cloud Environment -- Access Controls for Remote Access -- Operating System Baseline Compliance Monitoring and Remediation…”
Libro electrónico -
124792Publicado 2013Tabla de Contenidos: “…-- Expectation of Privacy -- Chapter 5: Choosing Your Procedures -- Forensic Imaging -- Determining Your Comfort Level -- Forensic Imaging Method Pros and Cons -- Creating Forms and Your Lab Manual -- Chain of Custody Forms -- Request Forms -- Report Forms -- Standard Operating Procedures Manual -- Chapter 6: Testing Your Tools -- When Do You Need to Test -- Collecting Data for Public Research or Presentations -- Testing a Forensic Method -- Testing a Tool -- Where to Get Test Evidence -- Raw Images -- Creating Your Own Test Images -- Forensic Challenges -- Learn Forensics with David Cowen on YouTube -- Honeynet Project -- DC3 Challenge -- DFRWS Challenge -- SANS Forensic Challenges -- High School Forensic Challenge -- Collections of Tool Testing Images -- Digital Forensic Tool Testing Images -- NIST Computer Forensics Reference Data Sets Images -- The Hacking Case -- NIST Computer Forensics Tool Testing -- Chapter 7: Live vs. …”
Libro electrónico -
124793Publicado 2017Tabla de Contenidos: “…-- Related types of attacks -- Examples of MITM -- Tools for MITM attacks -- Installing MITMF using Kali Linux -- Summary -- Chapter 8: Passing and Cracking the Hash -- What is a hash? …”
Libro electrónico -
124794Publicado 2017Tabla de Contenidos: “…2.3.2.5 Inverter model -- 2.3.2.6 Pump -- 2.4 Conclusions -- References -- 3 Sizing Optimization of the Photovoltaic Irrigation Plant Components -- 3.1 Introduction -- 3.2 A Review on Sizing Algorithms in the Literature -- 3.3 Sizing Algorithm Proposal -- 3.3.1 Algorithm 3.1: determination of SM and nbatM -- 3.3.2 Algorithm 3.2: deduction of Sopt and Copt -- 3.4 Application to a Case Study -- 3.4.1 Sizing for the case study -- 3.4.2 Validation using measured climatic data -- 3.4.3 Validation using HOMER -- 3.4.4 Validation using PVsyst -- 3.4.5 Days of autonomy -- 3.5 Conclusions -- References -- 4 Optimum Energy Management of the Photovoltaic Irrigation Installation -- 4.1 Introduction -- 4.2 Review of Renewable Energy Management in Irrigation -- 4.2.1 Review of energy management methods -- 4.2.2 Fuzzy logic for energy management -- 4.3 Problem Formulation -- 4.4 Proposed EMA -- 4.4.1 Energy management strategy -- 4.4.2 Relays switching modes -- 4.4.3 Fuzzy EMA -- 4.4.3.1 Knowledge base -- PV power Ppv -- Battery dod -- Stored water volume ν -- Months M -- Water level L -- Power difference ΔP -- Relays Rl,Rb,Rlb -- 4.4.3.2 Fuzzification -- PV Power P ̃pv -- Battery dod -- Water volume v -- Power difference ΔP -- Switching control of the relays Rl,Rb,Rlb -- 4.4.3.3 Inference diagram -- 4.4.3.4 Defuzzification -- 4.5 Application to a Case Study -- 4.5.1 Algorithm parameterization -- 4.5.1.1 PV power Ppv -- 4.5.1.2 Battery dod -- 4.5.1.3 Stored water volume v -- 4.5.2 Results and discussions -- 4.6 Experimental Validation -- 4.6.1 Installation description -- 4.6.2 Cases study validation -- 4.7 Conclusions -- References -- 5 Viability of DG, DG/PV and PV/ Batteries Plants for Water Pumping: Sensitivity Analysis According to Geographical and Eco... -- 5.1 Introduction -- 5.2 Water Pumping Systems Equipped With DG…”
Libro electrónico -
124795por Ridder, DetlefTabla de Contenidos: “…Intro -- Impressum -- Einleitung -- Kapitel 1: Erste Schritte und Installation -- 1.1 Was kann man von einem »freien« (kostenlosen) CAD-Programm erwarten? …”
Publicado 2023
Libro electrónico -
124796Publicado 2014Tabla de Contenidos: “…-- BPMS AND BAM -- BPMS, SOA, AND THE CLOUD -- CHOOSING A BPMS PRODUCT -- THE CURRENT BPMS MARKET -- SOME LEADING BPMS VENDORS -- MARKET TRENDS -- PROCESS MODELING TOOLS VS BPMS SUITES -- CREATING A BPMS APPLICATION -- NOTES AND REFERENCES -- Chapter Seventeen - ERP-Driven Redesign -- PROCESSES, PACKAGES, AND BEST PRACTICES -- A CLOSER LOOK AT SAP -- IMPLEMENTING AN ERP-DRIVEN DESIGN -- CASE STUDY: NESTLÉ USA INSTALLS SAP -- USING BPMS TO IMPROVE ERP INSTALLATIONS -- ENTERPRISE RESOURCE PLANNING AND BUSINESS PROCESS MANAGEMENT SUITE -- ERP VS BPMS APPLICATIONS -- NOTES AND REFERENCES -- Chapter Eighteen - The Future of Business Process Management -- Appendix 1 - Business Problem Analysis Checklist -- OUTPUT PROBLEMS -- INPUT PROBLEMS -- GUIDE PROBLEMS -- ENABLER PROBLEMS -- PROCESS ACTIVITY AND FLOW PROBLEMS -- PROBLEMS WITH THE MANAGEMENT OF A PROCESS -- Appendix 2 - Core Business Process Modeling Notation -- AN OVERVIEW OF A BPMN DIAGRAM USED FOR BUSINESS PROCESS ANALYSIS AND REDESIGN -- AN ACTIVITY -- AN EVENT -- A GATEWAY -- A SEQUENCE FLOW -- A MESSAGE FLOW -- A DATA OBJECT -- AN ASSOCIATION -- A POOL WITH SWIMLANES…”
Libro electrónico -
124797Publicado 2023Tabla de Contenidos: “…How to Create an Azure Artifacts Feed -- Public Feeds -- Azure Artifacts Feed Views -- Types of Azure Artifacts Feed Views -- Upstream Sources -- Setting Up Upstream Sources -- How to Update a Feed to Use an Upstream Source -- How to Create a Feed with Upstream Source Capability -- How to Add a Feed in Your Organization to an Upstream Source -- Publishing Artifacts in Azure Pipelines -- Publishing Artifacts Using the publish Keyword in YAML -- Publishing Artifacts Using a YAML Task -- Publishing Artifacts Using the Classic Editor -- Downloading Artifacts in Azure Pipelines -- Downloading Artifacts Using the Download Keyword in YAML -- Downloading Artifacts Using a YAML Task -- Downloading Artifacts Using the Classic Editor -- Summary -- Chapter 8 Automating Code Deployments with Azure Pipelines -- Continuous Deployment and Continuous Delivery in DevOps -- Continuous Deployment -- Continuous Deployment Tools -- Advantages of Continuous Deployment -- Continuous Delivery -- Advantages of Continuous Delivery -- Release Pipelines -- Advantages of Release Pipelines -- How Release Pipelines Work in Azure -- Deployment Model Using Azure Release Pipelines -- Creating the Release Pipeline -- Creating a Release -- Multistage Pipelines -- Summary -- Chapter 9 Application Testing with Azure Test Plans -- Overview of Azure Test Plans -- How Azure Test Plans Work -- Advantages of Azure Test Plans -- Creating Test Plans and Test Suites -- Test Plans -- Test Suites -- Adding a Static Test Suite -- Adding a Requirement-BasedTest Suite -- Adding a Query-BasedTest Suite -- Test Cases -- Overview of Test Cases -- Creating Test Cases -- Configurations in Tests -- Creating Test Configurations -- Assigning Test Configurations -- Running Manual Tests -- Running Tests with Configurations -- Viewing Manual Test Results -- Running Automated Tests from Test Plans…”
Libro electrónico -
124798Publicado 2003Tabla de Contenidos: “…FICON attachment of IBM tapes -- 6.1 FICON overview -- 6.2 FICON infrastructure -- 6.2.1 Channels -- 6.2.2 Fiber connections -- 6.2.3 Directors -- 6.2.4 FICON control units -- 6.2.5 FICON management -- 6.2.6 Sharing with storage area networks -- 6.3 3590-A60 control unit -- 6.3.1 Installation options -- 6.3.2 Features -- 6.3.3 Software support for FICON 3590-A60s -- 6.3.4 Defining devices -- 6.3.5 Performance -- 6.4 IBM 3592-J70 control unit -- 6.4.1 Installation options -- 6.4.2 Features -- 6.4.3 Software support for FICON 3592-J70s -- 6.4.4 Defining devices -- 6.5 IBM 3494 Virtual Tape Server -- 6.5.1 Connectivity -- 6.5.2 Software support -- 6.5.3 Advanced functions with the VTS -- 6.5.4 Feature codes -- Appendix A. …”
Libro electrónico -
124799Publicado 2001Tabla de Contenidos: “…(I-Am-In) -- Throw Core -- Veritas Disk Check -- Disk-Space Checker -- Port Monitor -- Service Monitoring -- Web Content -- SMTP and POP3 -- DNS -- More Monitoring Suggestions -- Pinging with Cisco -- Simple SNMP Agent -- Switch Port Control -- Wireless Networking -- SNMP: The Object-Oriented Way -- Extending SNMP::Info -- Final Words -- MRTG -- Using MRTG…”
Libro electrónico -
124800Publicado 2022Tabla de Contenidos: “…Adjust the Design of a Report -- Work with Dashboards -- Create a New Report or Dashboard -- Print a Report -- Key Terms -- Review Questions -- Part IV Close Your Project -- Lesson 13 Obtain Project Acceptance -- Present the Project to the Sponsor -- Secure Official Project Sign-Off -- Complete Final Refinements -- Have the Sponsor Sign Off on the Project -- Celebrate With Your Team -- Key Terms -- Review Questions -- Lesson 14 Retain Project History -- Document Lessons Learned -- Identify the Information You Can Use -- Gather Lessons Learned -- Document and Share the Lessons Learned -- Archive Project History -- Clean Up Your Project Plan -- Add Key Documents to the Project Plan -- Organize the Archive File Structure -- Key Terms -- Review Questions -- Appendix Answers to the Review Questions -- Lesson 1. …”
Libro electrónico