Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 22,128
- Història 9,601
- History 6,952
- Biblia 5,994
- Església Catòlica 4,466
- Crítica e interpretación 4,462
- Filosofía 4,405
- Iglesia Católica 3,892
- Economic conditions 3,756
- Management 3,373
- Teología 3,176
- Bíblia 3,158
- Goigs 3,059
- Sermones 2,964
- Development 2,866
- Economic policy 2,788
- Música 2,753
- Education 2,607
- Engineering & Applied Sciences 2,607
- Business & Economics 2,595
- Derecho 2,567
- Oración 2,546
- Liturgia 2,517
- Teología dogmática 2,474
- Litúrgia 2,344
- Moral cristiana 2,191
- Filosofia 2,161
- Teatro español 2,143
- Educación 2,128
- Application software 2,064
-
544401
-
544402
-
544403Publicado 2006“…Download PDF of book with textbook cover (6.0MB) Order hardcopy of book with textbook cover Note: The contents of the book are identical in both the textbook and redbook versions except for the covers…”
Libro electrónico -
544404por Wright, CraigTabla de Contenidos: “…; Viruses; Bombs; Trojans; Worms; Policy > Procedure > Audit; Summary; Chapter 3: The Information Systems Audit Program; Introduction; Audit Checklists; Baselines; Baselines and Automation; Assurance; Testing Your Organization's Security; Objectivity; Standards and Ethics…”
Publicado 2008
Libro electrónico -
544405Publicado 2008Tabla de Contenidos: “…2.1.1 Technology advancements2.1.2 Services; 2.1.3 Cost and performance; 2.2: 3G evolution: Two Radio Access Network approaches and an evolved core network; 2.2.1 Radio Access Network evolution; 2.2.2 An evolved core network: system architecture evolution; Part II: Technologies for 3G Evolution; Chapter 3 High data rates in mobile communication; 3.1 High data rates: Fundamental constraints; 3.1.1 High data rates in noise-limited scenarios; 3.1.2 Higher data rates in interference-limited scenarios; 3.2 Higher data rates within a limited bandwidth: Higher-order modulation…”
Libro electrónico -
544406por Wiles, JackTabla de Contenidos: “…Forensic AcquisitionProcessing Local Mail Archives; Chapter 10: Murder and Money: The Story of Standards, Accreditation, and Certification in Computer Forensics; Introduction; Standards; Accreditation; Certification; Rough Beginnings; Money to the Rescue; Standards and Computer Forensics; Certification Options for the Digital Evidence Analyst; Another Standards Option; Chapter 11: Starting a Career in the Field of Techno Forensics; Introduction; Occupations; Professional Organizations; Professional Certifications; Degree Programs…”
Publicado 2007
Libro electrónico -
544407por Wiles, JackTabla de Contenidos: “…An Approach to SCADA Information Security AssessmentsPre-Project Activities; Vetting the Assessment Request; Gaining Buy-In from Management and Technical Personnel; Management Buy-In; Technical Staff Buy-In; Researching the Organization; Researching Regulatory and Policy Requirements; Determining if this Is a Baseline Assessment or a Repeat Assessment; Making a Go/No-Go Decision; Pre-Assessment Activities; Determining the Organizational Mission; Identifying Critical Information; Example: Information Criticality; Business Description; Mission Statement; Critical Information for OOPS…”
Publicado 2007
Libro electrónico -
544408por MacDonald, Matthew“…Within these pages, you'll find tips for “best practices” and comprehensive discussions of key database and XML principles you need to know in order to be effective with ASP.NET. The book also emphasizes the invaluable coding techniques of object orientation and code behind, which will start you off on the track to building real–world web sites right from the beginning—rather than just faking it with simplified coding practices. …”
Publicado 2007
Libro electrónico -
544409por Landy, Gene K.Tabla de Contenidos: “…; The (Very Modest) Requirement of Originality; Copyright and Musical Works; Exclusive Rights under Copyright Law; Expressions vs. …”
Publicado 2008
Libro electrónico -
544410Release your brilliance the 4 steps to transforming your life and revealing your genius to the worldpor Bailey, Simon T.“…Join the thousands of individuals and organizations worldwide who've sat down with Simon and learned to create lasting change and release their brilliance!…”
Publicado 2007
Libro electrónico -
544411Publicado 2005“…Simply put, this book offers you emergency remedies for the real training challenges and situations training professionals face every day on the front lines of most organizations. As the author notes in Chapter 1, this book is designed for trainers with some battle "scars" who get calls "asking for the impossible to be delivered the next day" without budget or staff to accomplish this feat. …”
Libro electrónico -
544412por Flower, Darren R.“…The author has done an excellent job of covering the many topics that fall under the umbrella of computational biology for vaccine design, demonstrating an admirable command of subject matter in fields as disparate as object-oriented databases and regulation of T cell response. …”
Publicado 2008
Libro electrónico -
544413por Falcone, PaulTabla de Contenidos: “…6: Likability Equals Compatibility: Matching Candidates' Personalities to Your Organization's Corporate Culture7: The College Campus Recruit; 8: Millennials-The Future Generation of Your Workforce; 9: The Sales Interview: Differentiating Among Top Producers, Rebel Producers, and Those Who Struggle to the Minimums; 10: Senior Management Evaluations: Leaders, Mentors, and Effective Decision Makers; 11: Pressure Cooker Interview Questions: Assessing Grace Under Fire; 12: Generic Interview Questions Known to Challenge Candidates in the Final Rounds of Hire…”
Publicado 2009
Libro electrónico -
544414Publicado 2007Tabla de Contenidos: “…Introduction -- Single binary predictor -- Single continuous predictor -- Comparison and covariate adjustment of ROC curves -- Ordinal predictors -- Lehmann family of ROC curves -- ROC curves with censored data -- Using the ROC curve to evaluate multivariable prediction models -- ROC curves in SAS Enterprise Miner…”
Libro electrónico -
544415Publicado 2006“…Managers are crucial to the success of organizations because they make executive-level strategies happen. …”
Libro electrónico -
544416Publicado 2009Tabla de Contenidos: “…The advantages of mobile technologies in spatial and sensory learning activities; Georeferenced multisensory messages within a collaborative activity: a mobile application; Conclusion; Acknowledgments; References; Chapter 9: LeapFrog Learning Design: Playful Approaches to Literacy, from LeapPad to the Tag Reading System; The original mobile learning technology: toys; The evolution of leapfrog learning design; Designing for the tag ecosystem; Conclusion: system learning; References; Chapter 10: Designing the Intel-Powered Classmate PC; Intel in education…”
Libro electrónico -
544417por Garber, Peter R.“…They also will help you guide employees and your organization to be better prepared for the challenges ahead. …”
Publicado 2006
Libro electrónico -
544418por Nisbet, RobertTabla de Contenidos: “…Basic Descriptive StatisticsCombining Groups (Classes) for Predictive Data Mining; Generalized Linear Models (GLMs); Data Miner Workspace Templates; Comparison of Models with and Without Time-Based Features; Example: The IDP Facility of STATISTICA Data Miner; Ensembles in General; Part 2: The Algorithms in Data Mining and Text Mining, the Organization of the Three most common Data Mining Tools, and Selected Speci...; Chapter 7: Basic Algorithms for Data Mining: A Brief Overview; Preamble; STATISTICA Data Miner Recipe (DMRecipe); Automated Neural Nets; Generalized Additive Models (GAMs)…”
Publicado 2009
Libro electrónico -
544419por Apgar, DavidTabla de Contenidos: “…Conclusion: THE BEGINNING OF THE RELEVANCE REVOLUTION1. How Is Organizational Learning Related to Growth?; 2. What's Wrong with Balanced Scorecards, and What's the Alternative?…”
Publicado 2008
Libro electrónico -
544420por Delahaye, SylvieTabla de Contenidos: “…Introduction to Fault Analyzer -- 6.1 Start by validating your software levels -- 6.1.1 PTF information -- 6.2 How Fault Analyzer works -- 6.2.1 The fault history file -- 6.2.2 Supported application environments -- 6.2.3 A summary of real-time analysis -- 6.3 Preparing your programs for Fault Analyzer -- 6.3.1 Compiler options -- 6.3.2 What is a side file -- 6.3.3 How to create a side file -- 6.4 Using FA to re-analyze an abend -- 6.4.1 Interactive re-analysis -- 6.4.2 Synopsis section -- 6.4.3 Point-of-failure section -- 6.4.4 Events section -- 6.4.5 System-wide information section -- 6.4.6 Batch re-analysis -- 6.4.7 Specifying listings to Fault Analyzer in re-analysis -- 6.5 Using FA to analyze CICS system dumps -- 6.5.1 How to select a system dump data set for FA analysis -- 6.5.2 Analyzing a CICS system dump -- 6.6 How to set up and customize Fault Analyzer -- 6.6.1 Invocation exits -- 6.6.2 CICS set-up -- 6.6.3 Batch set-up -- 6.6.4 User exits -- 6.7 Options available to customize Fault Analyzer -- 6.7.1 How to specify these options -- 6.7.2 Order of precedence -- 6.7.3 User-options file (IDIOPTS) -- 6.8 Hints and tips -- 6.8.1 Systems programmer notes -- 6.8.2 Place abends in different fault history file…”
Publicado 2002
Libro electrónico