Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 21,783
- Història 9,630
- History 6,953
- Biblia 5,801
- Església Catòlica 4,468
- Filosofía 4,333
- Crítica e interpretación 4,158
- Iglesia Católica 3,873
- Economic conditions 3,756
- Management 3,373
- Bíblia 3,161
- Goigs 3,059
- Sermones 2,951
- Teología 2,867
- Development 2,866
- Economic policy 2,788
- Música 2,723
- Education 2,607
- Engineering & Applied Sciences 2,607
- Business & Economics 2,595
- Oración 2,541
- Derecho 2,498
- Teología dogmática 2,363
- Litúrgia 2,345
- Liturgia 2,293
- Moral cristiana 2,208
- Filosofia 2,167
- Teatro español 2,139
- Educación 2,103
- Application software 2,064
-
546681The handbook of program management how to facilitate project success with optimal program managementPublicado 2014“…THE DEFINITIVE GUIDE TO PROGRAM MANAGEMENT--FULLY UPDATED AND REVISED Program managers must strike a balance between operations and project implementations in order to develop and maintain a culture in which the components of success are repeatable. …”
Libro electrónico -
546682Publicado 2015Tabla de Contenidos: “…Machine generated contents note: Part I Information Security Infrastructure -- 1: The Need for Information Security -- 2: Concepts in Informaiton Security -- 3: Assets, Threats, Vulnerabilities, Risks, and Controls -- 4: Security Professionals and Organizations -- 5: Information Security management System -- 6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans -- Part II Information Security Planning Process -- 7: Approaches to Implementing Information Security -- 8: Organizational Structure for Mananging Information Security -- 9: Asset Management -- 10: Information Security Risk Management -- 11: Information Security Policy -- 12: Human Resouce Security -- 13: Certification, Accreditation, and Assurance -- Part III Information Security Prevention Process -- 14: Information Security in System Development -- 15: Physical and Environmental Security Controls -- 16: Information Security Awareness, Training, and Education -- 17: Preventive Tools and Techniques -- 18: Access Control -- Part IV Information Security Detection Process -- 19: Information Security Monitoring Tools and Methods -- 20: Information Security Measurements and Metrics -- Part V Information Security Recovery Process -- 21: Information Security Incident Handling -- 22: Computer Forensics -- 23: Business Continuity -- 24: Backup and Restoration -- Appendices…”
Libro electrónico -
546683
-
546684Publicado 2014Tabla de Contenidos: “…11.13 PES Streams 260 -- 11.14 Room for Future Extensions 260 -- References 261 -- 12 The MPEG-2 System Target Decoder Model 263 -- 12.1 Introduction to the MPEG-2 STD 263 -- 12.2 The Program Stream STD: P-STD 264 -- 12.2.1 Description of P-STD 264 -- 12.2.2 Buffer Management in the P-STD 267 -- 12.2.3 CSPS: Constrained System Parameter Program Stream 268 -- 12.2.4 Usage of P-STD for PES-STD 270 -- 12.3 Transport Stream STD: T-STD 275 -- 12.3.1 Description of T-STD 275 -- 12.3.2 The Use of Transport Buffers 279 -- 12.3.3 System Data Processing and Buffer Management 281 -- 12.3.4 Processing of Elementary Stream Data 284 -- 12.3.5 T-STD Buffers for Elementary Stream Decoding 288 -- 12.3.6 Buffer Management for Elementary Stream Data 290 -- 12.4 General STD Constraints and Requirements 290 -- 12.5 Content Format Specific STD Issues 292 -- 12.5.1 Decoding of MPEG Audio Streams in STD Model 292 -- 12.5.2 Decoding of MPEG Video Streams in STD Model 295 -- 13 Data Structure and Design Considerations 299 -- 13.1 System Time Clock Samples and Time Stamps 299 -- 13.2 PES Packets 301 -- 13.3 Descriptors of Programs and Program Elements 309 -- 13.3.1 General Format of Descriptors 309 -- 13.3.2 Types of Descriptors 311 -- 13.3.3 System Orientated Descriptors 311 -- 13.3.4 General Content Descriptors 315 -- 13.4 Program Streams 319 -- 13.5 Sections 326 -- 13.6 Transport Streams and Transport Packets 329 -- Reference 331 -- 14 Content Support in MPEG-2 Systems 333 -- 14.1 Introduction 333 -- 14.2 MPEG-1 334 -- 14.2.1 MPEG-1 Video 334 -- 14.2.2 MPEG-1 Audio 334 -- 14.2.3 MPEG-1 System Stream 334 -- 14.3 MPEG-2 336 -- 14.3.1 MPEG-2 Video 336 -- 14.3.2 MPEG-2 (BC) Audio 338 -- 14.3.3 MPEG-2 AAC 340 -- 14.3.4 MPEG-2 DSM-CC 341 -- 14.3.5 MPEG-2 System Stream 342 -- 14.3.6 MPEG-2 IPMP 343 -- 14.4 (ITU-T Rec.) …”
Libro electrónico -
546685
-
546686Publicado 2012“…Ilan Alon thoroughly covers key challenges from both the franchisor and franchisee perspective, teaching lessons learned by Marks and Spencer, Ruth’s Chris Steakhouse, Athlete’s Foot, Kodak, Sari Organic, and other pioneers. Through these cases, he addresses pivotal issues such as: Should you take your franchise operation global? …”
Libro electrónico -
546687Publicado 2014Tabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction to the Gradebook; Getting to the Gradebook; Activities that work with the Gradebook; Key features of the Gradebook; Organizing grades; Summary; Chapter 2: Customizing the Grades; Numeric grades; Letter grades; Customizing letter grades; Creating a letter grade that uses words; Creating scales to grade assignments; Customizing grade scales; Have another go!…”
Libro electrónico -
546688
-
546689Publicado 2015Libro electrónico
-
546690
-
546691Publicado 2014“…Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. …”
Libro electrónico -
546692Publicado 2011“…Il faut faire quelque chose ! Ce guide pratique, organisé en cinq grandes parties, va vous permettre, à l'aide d'outils, de cas pratiques et de questionnaires, de mieux gérer vos priorités, de gagner du temps et de savoir prendre du recul grâce à la méthode "FOCUS" : appréciez les Faits : vos réalisations et votre rapport au temps; partez de vos Objectifs pour définir vos priorités ; développez vos Compétences en termes de gestion du temps et des priorités; améliorez les Usages que vous en faites; faites progresser votre Savoir-faire pour un meilleur rapport à autrui. …”
Libro electrónico -
546693Publicado 2015“…"Text contains both numerical examples and excerpts from contracts, in order to provide useful explanations followed by immediate practical cases"-- Provided by publisher…”
Libro electrónico -
546694Publicado 2015Tabla de Contenidos: “…Your pal the pointer -- Inessential C syntax that textbooks spend a lot of time covering -- Important C syntax that textbooks often do not cover -- Easier text handling -- Better structures -- Object-oriented programming in C -- Parallel threads -- Libraries -- Epilogue -- A. …”
Libro electrónico -
546695Publicado 2013“…Enterprise Analytics is today’s definitive guide to analytics strategy, planning, organization, implementation, and usage. It covers everything from building better analytics organizations to gathering data; implementing predictive analytics to linking analysis with organizational performance. …”
Libro electrónico -
546696Publicado 2015Tabla de Contenidos: “…Title Page; Copyright Page; Contents at a Glance; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part I: Getting Started with the BeagleBone; Chapter 1: Introducing the BeagleBone; Touring the Original BeagleBone and the BeagleBone Black; Exploring Uses for the BeagleBone; Accessorizing Your BeagleBone; Chapter 2: Installing the Operating System; Introducing Linux; Selecting a Distribution; Knowing the factory defaults on your BeagleBone; Downloading your Linux distribution…”
Libro electrónico -
546697Publicado 2015Tabla de Contenidos: “…Chapter 3: Smart Inorganic and Organic Pretreatment Coatings for the Inhibition of Corrosion on Metals/Alloys 3.1. …”
Libro electrónico -
546698Publicado 2013Tabla de Contenidos: “…Implementing a service-oriented architecture -- Understanding application architecture -- Unit testing -- Understanding the dependency inversion principle -- Using test doubles with unit tests -- Initial solution review -- Planning the project -- Identifying development tools and the build process -- Cleaning up legacy solutions -- Establishing the foundation -- Basic refactoring to services -- Advanced refactoring to services -- Refactoring to a controller -- Reengineering .NET projects with Visual Studio 2012.…”
Libro electrónico -
546699Publicado 2011“…Présentation Toutes les facettes de votre iPhone pour l'utiliser efficacement en toutes situations Paramétrez le répondeur et son déclenchement, configurez l'accès à votre boîte e-mail et tirez parti du multitâche Synchronisez et sauvegardez vos données : contacts, SMS, calendriers, achats iTunes sur un ou plusieurs ordinateurs Dénichez les meilleures applications sur l'App Store pour transformer votre iPhone en liseuse électronique, webcam, télécommande... …”
Libro electrónico -
546700por Macey, Jonathan R.“…They treated customers well and sometimes endured losses in transactions or business deals in order to sustain and nurture their reputations as faithful brokers and 'gate-keepers.' …”
Publicado 2013
Libro electrónico