Mostrando 124,541 - 124,560 Resultados de 127,501 Para Buscar 'Prowent~', tiempo de consulta: 1.72s Limitar resultados
  1. 124541
    Publicado 2021
    “…Most executives have little time for extensive reading or patience with "sales" presentations. Those same leaders will therefore appreciate the simple, uncluttered, and, above all, objective summary this book provides.The book breaks down the process of transforming the organization around Lean principles into three component transformational phases or steps, namely, Introduction, Integration, and Internalization (i.e., the I-3 strategy). …”
    Libro electrónico
  2. 124542
    “…By studying this book, you will know where to locate useful educational data in different sources and understand their limitations; know the basics for managing educational data to make them useful; understand relevant methods; and be able to use relevant tools; know the basics for organising, analysing, interpreting and presenting learner-generated data within their learning context, understand relevant learning analytics methods and be able to use relevant learning analytics tools; know the basics for analysing and interpreting educational data to facilitate educational decision making, including course and curricula design, understand relevant teaching analytics methods and be able to use relevant teaching analytics tools; understand issues related with educational data ethics and privacy. …”
    Libro electrónico
  3. 124543
    Publicado 2023
    “…Voulue pour matérialiser la permanence de l'Église-institution, l'Église de pierre existe grâce aux multiples interactions qu'elle accueille et qu'organisent les objets, éléments de mobilier, formes architecturales, images et discours visuels que le présent volume s'attache à mettre en lumière…”
    Libro electrónico
  4. 124544
    por Fried, Johannes
    Publicado 2007
    “…To find the answer, it is necessary to approach the question on two different semantic levels: First, as the Constitutum Constantini, a fictitious privilege, in which, among other things, rights and presents were bestowed on the catholic church by a grateful Emperor Konstantin. …”
    Libro electrónico
  5. 124545
    Publicado 2015
    “…What steps should you take to protect your equipment while shooting on location? …”
    Libro electrónico
  6. 124546
    Publicado 2014
    “…Along the way, the various applications are presented side-by-side so that a user of one may learn how to use the other: a kind of workflow Rosetta Stone. …”
    Libro electrónico
  7. 124547
    Publicado 2016
    “…This revised and enlarged edition includes the following topics: New and expanded introduction to the macro language Functions, automatic macro variables, and macro statements new to the macro language Expanded macro language tools that interface with the operating system Expanded data-driven methodologies used to build dynamic applications Expanded discussion of list processing, with four alternative approaches presented Additional file and data management examples Expanded discussion of CALL EXECUTE and DOSUBL New discussion of using the macro language on remote servers Expanded discussion and examples of macro quoting Far beyond a reference manual issued from an “ivory tower,” this book is pragmatic and example-driven: Yes, you will find syntax examples; yes, the code is explained. …”
    Libro electrónico
  8. 124548
    Publicado 2016
    “…Using a single tool for both configuration management and deployment makes life simpler for the folks responsible for operations. Project goals include a consistent, secure, highly reliable tool that's minimal in nature and has a low learning curve. …”
    Libro electrónico
  9. 124549
    Publicado 2024
    “…Interactions between human beings and the environment have settled like sediment down the centuries and may be read in the present - in the form of landscapes and collective memory, in bodies of water and the earth's strata, tree rings and human cells. …”
    Libro electrónico
  10. 124550
    por Aagaard, Annabeth
    Publicado 2024
    “…She is also heavily involved in research projects on ESG, sustainable and digital business development, sponsored by industrial foundations. …”
    Libro electrónico
  11. 124551
    Publicado 2006
    “…Law and Ethics in Coaching presents the first comprehensive look at ethical and legal issues in coaching. …”
    Libro electrónico
  12. 124552
    Publicado 2001
    “…Step-by-step tutorials of the most common ActionScript behaviors Object-oriented programming in Flash Intelligent interface development Server communication Dynamic content generation Password protection String handling Message boards Basic physics Games Code samples are also available from the "Code Depot" on the author's web site devoted to Flash developers. …”
    Libro electrónico
  13. 124553
    Publicado 2007
    “…SEE HOW TO Produce and customize reports that show exactly how your company is doing Schedule transactions so you’ll never forget a due date again Bill time and expenses directly to customers Use the new QuickBooks features for 2007, including a redesigned Payroll Center and the new Accountant’s Copy that lets you keep working while your accountant reviews your books Create and use a budget Reconcile your bank account to the penny without waiting for the bank statement to come in the mail Keep detailed records of fixed asset acquisitions Protect your financial information with the latest in security techniques Send customized mailings to your customers and vendors 1. …”
    Libro electrónico
  14. 124554
    Publicado 2010
    “…Using C#, this book presents real world, practical examples that will help you put ADO.NET to work immediately.Topics covered in the book include: An Introduction to ADO.NET Connections, Commands and DataReaders Disconnected Data Advanced DataSets Transactions DataViews and Data Binding XML and the DataSet Included with the book is a Visual Studio .NET add-in that integrates the entire reference directly into your help files. …”
    Libro electrónico
  15. 124555
    Publicado 2005
    “…This book goes beyond conventional step-by-step instruction, teaching you bread-and-butter effects that you can adapt and combine for countless projects. • Real solutions from real professionals: Nobody does it better, and now they’ll show you how. …”
    Libro electrónico
  16. 124556
    por Norberg, Stefan
    Publicado 2001
    “…Providing extra security protection for exposed systems by installing an additional network (known as a "perimeter network") that separates the Internet from an organization's internal networks. …”
    Libro electrónico
  17. 124557
    por Weltman, Rob, 1953-
    Publicado 2000
    “…Specific topics covered include: The LDAP naming and information models The command-line tools of the SDK Authentication with a password, SSL, and SASL Configuring access control Writing LDAP applets for a browser Accessing the SDK from JavaScript Storing configuration and preferences in a directory Encapsulating LDAP functionality in a JavaBean Using LDAP in Java servlets LDAP URLs Multiple threads and multiple connections Referrals and replicated systems LDAP controls Synchronous and asynchronous operations Performance tips LDAP Programming with Java (TM) also presents numerous examples, from simple code snippets to complete components and applications…”
    Libro electrónico
  18. 124558
    Publicado 2004
    “…Quigley illuminates each concept with up-to-date, classroom-tested code examples designed to help you jump-start your own projects. She also systematically introduces awk, sed, and grep for both UNIX and GNU/Linux . . . making this the only shell programming book you’ll ever need! …”
    Libro electrónico
  19. 124559
    por Quatrani, Terry
    Publicado 2003
    “…The book follows a simplified version of the Rational Unified Process from project inception through system analysis and design. …”
    Libro electrónico
  20. 124560
    Publicado 2008
    “…Coverage includes Mainframe basics: logging on, allocating and editing data sets, running JCL jobs, using UNIX System Services, and accessing documentation Creating, modifying, and deleting users and groups Protecting data sets, UNIX file system files, databases, transactions, and other resources Manipulating profiles and managing permissions Configuring the mainframe to log security events, filter them appropriately, and create usable reports Using auditing tools to capture static configuration data and dynamic events, identify weaknesses, and remedy them Creating limited-authority administrators: how, when, and why…”
    Libro electrónico