Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Biblia 3,667
- Bible 1,923
- Bíblia 1,428
- Historia 1,218
- RELIGION 1,042
- Development 808
- Application software 802
- Engineering & Applied Sciences 770
- Management 648
- Crítica e interpretación 560
- Computer Science 516
- Història 511
- History 455
- Computer networks 447
- Mss 430
- Data processing 412
- Cloud computing 375
- Criticism, interpretation, etc 374
- Computer programs 371
- Operating systems (Computers) 348
- Programming 343
- Comentarios 304
- Security measures 276
- Artificial intelligence 272
- Business & Economics 271
- Crítica, interpretación, etc 266
- Database management 262
- Testigos de Jehová 262
- iOS (Electronic resource) 261
- Crítica, interpretació, etc 249
-
49661Publicado 2006“…Video training pioneers Diana Weynand and Shirley Craig are co-owners of Weynand Training International, an Apple Authorized Training Center that provides training services to the entertainment industry. …”
Libro electrónico -
49662por Fedorov, Alex“…Alexei Federov describes how the main components of the platform -- Windows Forms, Web Forms, ADO.NET, web services and the Common Language Runtime -- can work together, enabling you to create high-performance applications more easily and efficiently. …”
Publicado 2002
Libro electrónico -
49663Publicado 2004“…Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of Visual C# .NET from the ground up. …”
Libro electrónico -
49664por Ballard, ChuckTabla de Contenidos: “…Consolidation project example: Table descriptions -- Data schemas on the EDW -- Data schemas on the ORACLE data mart -- Data schemas on the SQL Server 2000 data mart -- Appendix B. …”
Publicado 2005
Libro electrónico -
49665por Shirazi, Jack“…The book also provides performance tuning checklists that enable developers to make their tuning as comprehensive as possible. …”
Publicado 2000
Libro electrónico -
49666Publicado 2004“…You'll learn the hidden rules that govern smart buttons and animated blue underlines and find out how to take advantage of new style features , including table and list styles. Matt also explains how to type special characters and teaches you three techniques for entering frequently used characters . …”
Libro electrónico -
49667por Barken, Lee“…Topics covered include-- Why conventional wireless LANs are so insecure--and what you can do about it "Wardriving" software, equipment, and techniques: knowing your enemy 802.11i, WPA, TKIP, and AES: the new wireless security options 802.1x and EAP: enabling port-based authentication on your WLAN Safely connecting WLANs to wired networks Securing home and small office environments, one step at a time Accessing VPNs from wireless devices Integrating firewalls and wireless access points Improving security in public access environments Securing enterprise environments with 802.1x--a start-to-finish walkthrough…”
Publicado 2004
Libro electrónico -
49668por Shaffer, Jay“…Learn about pre-recorded loops that enable you to sound like you're singing with a symphony orchestra even if you can't actually play a single instrument. …”
Publicado 2004
Libro electrónico -
49669por Chen, Zhiqun, 1969-“…It opens the smart card marketplace to third-party application development and enables programmers to develop smart card applications for a wide variety of vendors' products. …”
Publicado 2000
Libro electrónico -
49670por Banzi, Massimo“…To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. …”
Publicado 2008
Libro electrónico -
49671Publicado 2005“…This Infoline will enable the reader to determine when to use a job aid; select the type of job aid to use; select the right medium; and design, implement, and evaluate the job aid. …”
Libro electrónico -
49672Publicado 2005“…. * Identify and plug the new holes in Oracle and Microsoft(r) SQL Server * Learn the best defenses for IBM's DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers * Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access * Recognize vulnerabilities peculiar to each database * Find out what the attackers already know Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts, and programs available for download…”
Libro electrónico -
49673por Purdy, Gregor N.“…This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. …”
Publicado 2004
Libro electrónico -
49674Publicado 2009“…Readers will learn about everything new in iPhoto '09, including: Faces, which allows you to organize your photos based on who’s in them; Places, which uses data from GPS-enabled cameras or your iPhone's camera to categorize photos by location with easily recognizable names; themed slideshows; online sharing via Facebook and Flickr with one click; enhanced photo editing tools; and more…”
Libro electrónico -
49675Publicado 2007“…The high availability capability can reduce or eliminate costly downtime through, as examples, the introduction of online index rebuild, the capability to create and drop indexes online without locking tables, and point-in-time table-level restore. Enhanced enterprise replication provides solutions for those customers requiring reliable and quick dissemination of data across a global organization. …”
Libro electrónico -
49676por Kerzner, Harold“…Now in a tenth edition, this industry-leading project management "bible" aligns its streamlined approach to the latest release of the Project Management Institute's Project Management Body of Knowledge (PMI's PMBOK® Guide), the new mandatory source of training for the Project Management Professional (PMP®) Certificat-ion Exam. …”
Publicado 2009
Libro electrónico -
49677por Zdziarski, Jonathan A.“…This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK frameworks necessary for designing full-featured applications. …”
Publicado 2009
Libro electrónico -
49678Digital audio editing correcting and enhancing audio in Pro Tools, Logic Pro, Cubase, and Studio OnePublicado 2014“…Focusing on techniques applicable to any digital audio workstation, it includes break-outs giving specific keystrokes and instruction in Avid’s Pro Tools, Apple’s Logic Pro, Steinberg’s Cubase, and PreSonus’s Studio One. …”
Libro electrónico -
49679por St. Cyr, KenTabla de Contenidos: “…Automating Active Directory® Administration with Windows PowerShell® 2.0; Table of Contents; Introduction; Part I Administering Service Delivery; Part II Managing Active Directory Data; Part III Protecting Your Investment in Active Directory; Index…”
Publicado 2011
Libro electrónico -
49680Publicado 2009“…Foster collaboration and accelerate information dissemination with blogs and wikis Implement folksonomic strategies to achieve business intelligence, analytics, and semantic web goals Capture and broadcast connection graphs and activity streams via social networks Bring together application data, business analytics, unstructured information, and collaborative interactions in enterprise mashups Enable rich Internet applications with Ajax, Ruby on Rails, Flash, FLEX, and other technologies Connect your Web 2.0 ecosystem through Web services, such as REST and JSON Ensure security and compliance management…”
Libro electrónico