Mostrando 125,261 - 125,280 Resultados de 127,182 Para Buscar 'Prowent~', tiempo de consulta: 1.65s Limitar resultados
  1. 125261
    Publicado 2019
    “…Con un estudio preliminar de uno de los más destacados estudiosos de la obra de Jung, como lo es Sonu Shamdasani, este libro posibilita estudiar la auto experimentación de Jung por medio de sus fuentes primarias y comprender la génesis de sus trabajos posteriores, a la vez que arroja una nueva luz respecto de la recuperación de la realidad del alma humana y la constitución de una nueva psicología. La presente edición castellana se realizó bajo el cuidado y supervisión de Bernardo Nante, reconocido investigador de C.G.Jung y sus fuentes…”
    Libro
  2. 125262
    Publicado 2003
    “…Although having access to equipment is the ideal way to profit from this book, relevant information delivered through figures, configuration examples, and detailed text ensures everyone can benefit from the information presented. Protocol analyzer traces emphasize important concepts and trouble areas. …”
    Libro electrónico
  3. 125263
    Publicado 2008
    “…The authors cover the technologies new to Windows 2008, such as IPv6, Network Access Protection (NAP), Network Policy Server (NPS), Terminal Services Remote Programs, Windows Deployment Services (WDS), Hyper-V virtualization, and more! …”
    Libro electrónico
  4. 125264
    Publicado 2005
    “…Use this complete guide to understand the following components of any thorough site survey: The architecture of the access points, cable routes, and electrical needs The proper site survey technique and usage of appropriate utilities The structural and installation obstacles, including building construction, transmission coverage area, building contents, present cable configuration, area regulations, and building codes The documentation that outlines the necessary parts and equipment, and diagrams exhibiting the proper placement of the equipment 802.11 Wireless Network Site Surveying and Installation begins with an introduction to WLAN architectures and definitions and then moves on to site survey methodologies, helping you assess and address your site's specific needs. …”
    Libro electrónico
  5. 125265
    Publicado 2003
    “…Leveraging the authors' extensive expertise at Cisco in the support of Cisco Catalyst switches and QoS deployment, the book presents QoS from the campus LAN perspective. It explains why QoS is essential in this environment in..…”
    Libro electrónico
  6. 125266
    Publicado 2007
    “…You'll also find pragmatic advice on a host of issues, including classification, implementation strategies, and cost-effective project management. New to this new edition are An introduction to the new UML 2.0, from the notation's most fundamental and advanced elements with an emphasis on key changes New domains and contexts A greatly enhanced focus on modeling--as eagerly requested by readers--with five chapters that each delve into one phase of the overall development lifecycle. …”
    Libro electrónico
  7. 125267
    por Lee, Kok-Keong
    Publicado 2005
    “…Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone’s b..…”
    Libro electrónico
  8. 125268
    Publicado 2003
    “…Official self-study test preparation guide for the CCIE Security written exam Review all CCIE Security written exam topics, including: Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists Encryption technologies and security protocols, including TACACS+, RADIUS, and Kerberos Windows and UNIX operating system security issues Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT Network security policies, vulnerabilities, and protection techniques With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. …”
    Libro electrónico
  9. 125269
    Publicado 2006
    “…SEARCH SECRETS: Michael Miller, along with Mikal Belicove and Joe Kraynak, have written the foreward that gets you up to speed on searching the Internet, blocking pop-up ads, protecting children online, accessing the wireless Web, plugging in to podcasts and webcasts, and reading fascinating weblogs (blogs). …”
    Libro electrónico
  10. 125270
    Publicado 2007
    “…You'll discover the right questions to ask, the key issues to focus on, and techniques proven to work. The authors present case studies from leading-edge software organizations, and offe..…”
    Libro electrónico
  11. 125271
    Publicado 2002
    “…The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. …”
    Libro electrónico
  12. 125272
    Publicado 2005
    “…Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. …”
    Libro electrónico
  13. 125273
    Publicado 2003
    “…Software architects and project managers will discover how SyncML components can be integrated into complete solutions; and developers will learn how to maximize the performance, reliability, and scalability of those solutions. …”
    Libro electrónico
  14. 125274
    por Mugridge, Rick
    Publicado 2005
    “…--Dave Thomas, coauthor of The Pragmatic Programmer “Ward and Rick do a great job in eschewing the typical, overly complicated technology trap by presenting a simple, user-oriented, and very usable technology that holds fast to the agile principles needed for success in this new millennium.” …”
    Libro electrónico
  15. 125275
    Publicado 2003
    “…It provides you with a proven catalog of archetype patterns: high-value model components that can be easily incorporated into Unified Modeling Language (UML) models. …”
    Libro electrónico
  16. 125276
    por Biersdorfer, J. D.
    Publicado 2009
    “…And get advice on buying copy-protection free songs from stores like Amazon and Rhapsody. …”
    Libro electrónico
  17. 125277
    Publicado 2008
    “…The troubleshooting guides present the essential methodologies, debugs, and analysis tools for quickly resolving both the common and complex issues that may be encountered. …”
    Libro electrónico
  18. 125278
    por Saita, Francesco
    Publicado 2007
    “…Practitioners¡¦ books are often based on a single experience, presenting the approach that has been pursued by a single bank, but often do not adequately evaluate that approach. …”
    Libro electrónico
  19. 125279
    por McFedries, Paul
    Publicado 2008
    “…Then we walk you step-by-step though a series of PC building projects. We show you how to build five different types of PC: a basic business PC, a home theater PC, a high-performance PC, a killer gaming PC, and a budget PC. …”
    Libro electrónico
  20. 125280
    por Perry, Gail
    Publicado 2009
    “…Produce and customize reports that show exactly how your company is doing Schedule transactions so you’ll never forget a due date again Bill time and expenses directly to customers Use the new QuickBooks features for 2009, including a redesigned Payroll Center and the new Accountant’s Copy that lets you keep working while your accountant reviews your books Create and use a budget Reconcile your bank account to the penny without waiting for the bank statement to come in the mail Keep detailed records of fixed asset acquisitions Protect financial information with the latest in security techniques Send customized mailings to your customers and vendors Learn tips and shortcuts to help make your QuickBooks experience more efficient and to customize your program to fit your style Process transactions the right way by following the accounting rules interspersed throughout the book Introduction xv Chapter 1: Setting Up Your Company with the EasyStep Interview 1 Chapter 2: Setting Up and Using Payroll Features 27 Chapter 3: Adding or Changing Information After the Interview Is Completed 69 Chapter 4: Invoicing and Collecting Income 107 Chapter 5: Making Purchases and Recording Payments 141 Chapter 6: Collecting and Paying Sales Tax 171 Chapter 7: Using Time-Saving Features 185 Chapter 8: Job Cost Estimating and Tracking 199 Chapter 9: Tracking Time 219 Chapter 10: QuickBooks Tips and Tricks 237 Chapter 11: Using the QuickBooks Online Features 263 Chapter 12: Preparing Income Tax Returns 295 Chapter 13: Security 309 Chapter 14: Using Inventory Features 328 Chapter 15: Recording Your Assets 349 Chapter 16: Recording Owners' Equity 363 Chapter 17: Recording Liabilities 371 Chapter 18: Preparing the Top Ten QuickBooks Reports 387 Workshops 411 Index 423…”
    Libro electrónico