Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,709
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,108
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Història 872
- Universidad Pontificia de Salamanca (España) 860
- Social aspects 807
- Crítica e interpretación 796
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
125261Publicado 2019“…Con un estudio preliminar de uno de los más destacados estudiosos de la obra de Jung, como lo es Sonu Shamdasani, este libro posibilita estudiar la auto experimentación de Jung por medio de sus fuentes primarias y comprender la génesis de sus trabajos posteriores, a la vez que arroja una nueva luz respecto de la recuperación de la realidad del alma humana y la constitución de una nueva psicología. La presente edición castellana se realizó bajo el cuidado y supervisión de Bernardo Nante, reconocido investigador de C.G.Jung y sus fuentes…”
Libro -
125262Publicado 2003“…Although having access to equipment is the ideal way to profit from this book, relevant information delivered through figures, configuration examples, and detailed text ensures everyone can benefit from the information presented. Protocol analyzer traces emphasize important concepts and trouble areas. …”
Libro electrónico -
125263Publicado 2008“…The authors cover the technologies new to Windows 2008, such as IPv6, Network Access Protection (NAP), Network Policy Server (NPS), Terminal Services Remote Programs, Windows Deployment Services (WDS), Hyper-V virtualization, and more! …”
Libro electrónico -
125264Publicado 2005“…Use this complete guide to understand the following components of any thorough site survey: The architecture of the access points, cable routes, and electrical needs The proper site survey technique and usage of appropriate utilities The structural and installation obstacles, including building construction, transmission coverage area, building contents, present cable configuration, area regulations, and building codes The documentation that outlines the necessary parts and equipment, and diagrams exhibiting the proper placement of the equipment 802.11 Wireless Network Site Surveying and Installation begins with an introduction to WLAN architectures and definitions and then moves on to site survey methodologies, helping you assess and address your site's specific needs. …”
Libro electrónico -
125265Publicado 2003“…Leveraging the authors' extensive expertise at Cisco in the support of Cisco Catalyst switches and QoS deployment, the book presents QoS from the campus LAN perspective. It explains why QoS is essential in this environment in..…”
Libro electrónico -
125266Publicado 2007“…You'll also find pragmatic advice on a host of issues, including classification, implementation strategies, and cost-effective project management. New to this new edition are An introduction to the new UML 2.0, from the notation's most fundamental and advanced elements with an emphasis on key changes New domains and contexts A greatly enhanced focus on modeling--as eagerly requested by readers--with five chapters that each delve into one phase of the overall development lifecycle. …”
Libro electrónico -
125267por Lee, Kok-Keong“…Regardless of whether the network connects to the Internet, fortifying IP networks for maximum uptime and prevention of attacks is mandatory for anyone’s b..…”
Publicado 2005
Libro electrónico -
125268Publicado 2003“…Official self-study test preparation guide for the CCIE Security written exam Review all CCIE Security written exam topics, including: Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP Cisco IOS(r) Software specifics, including password security, password recovery, and standard and extended access lists Encryption technologies and security protocols, including TACACS+, RADIUS, and Kerberos Windows and UNIX operating system security issues Cisco security applications, including Cisco PIX(r) Firewall, VPN, IDS, and Cisco Policy Manager Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT Network security policies, vulnerabilities, and protection techniques With increased reliance on networking resources to provide productivity gains and corporate revenue contributions, the need for network security has never been higher. …”
Libro electrónico -
125269Publicado 2006“…SEARCH SECRETS: Michael Miller, along with Mikal Belicove and Joe Kraynak, have written the foreward that gets you up to speed on searching the Internet, blocking pop-up ads, protecting children online, accessing the wireless Web, plugging in to podcasts and webcasts, and reading fascinating weblogs (blogs). …”
Libro electrónico -
125270Publicado 2007“…You'll discover the right questions to ask, the key issues to focus on, and techniques proven to work. The authors present case studies from leading-edge software organizations, and offe..…”
Libro electrónico -
125271Publicado 2002“…The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. …”
Libro electrónico -
125272Publicado 2005“…Additional improvements include a robust search feature (similar to that of iTunes) and the addition of "objects" for slideshow and book projects (using objects, you can manipulate images without affecting pictures in your master library). iPhoto 5: The Missing Manual covers them all with the scrupulous objectivity, clever wit, and technical wisdom you count on from David Pogue along with the Mac and digital photography expertise of Derrick Story. …”
Libro electrónico -
125273Publicado 2003“…Software architects and project managers will discover how SyncML components can be integrated into complete solutions; and developers will learn how to maximize the performance, reliability, and scalability of those solutions. …”
Libro electrónico -
125274por Mugridge, Rick“…--Dave Thomas, coauthor of The Pragmatic Programmer “Ward and Rick do a great job in eschewing the typical, overly complicated technology trap by presenting a simple, user-oriented, and very usable technology that holds fast to the agile principles needed for success in this new millennium.” …”
Publicado 2005
Libro electrónico -
125275Publicado 2003“…It provides you with a proven catalog of archetype patterns: high-value model components that can be easily incorporated into Unified Modeling Language (UML) models. …”
Libro electrónico -
125276por Biersdorfer, J. D.“…And get advice on buying copy-protection free songs from stores like Amazon and Rhapsody. …”
Publicado 2009
Libro electrónico -
125277Publicado 2008“…The troubleshooting guides present the essential methodologies, debugs, and analysis tools for quickly resolving both the common and complex issues that may be encountered. …”
Libro electrónico -
125278por Saita, Francesco“…Practitioners¡¦ books are often based on a single experience, presenting the approach that has been pursued by a single bank, but often do not adequately evaluate that approach. …”
Publicado 2007
Libro electrónico -
125279por McFedries, Paul“…Then we walk you step-by-step though a series of PC building projects. We show you how to build five different types of PC: a basic business PC, a home theater PC, a high-performance PC, a killer gaming PC, and a budget PC. …”
Publicado 2008
Libro electrónico -
125280por Perry, Gail“…Produce and customize reports that show exactly how your company is doing Schedule transactions so you’ll never forget a due date again Bill time and expenses directly to customers Use the new QuickBooks features for 2009, including a redesigned Payroll Center and the new Accountant’s Copy that lets you keep working while your accountant reviews your books Create and use a budget Reconcile your bank account to the penny without waiting for the bank statement to come in the mail Keep detailed records of fixed asset acquisitions Protect financial information with the latest in security techniques Send customized mailings to your customers and vendors Learn tips and shortcuts to help make your QuickBooks experience more efficient and to customize your program to fit your style Process transactions the right way by following the accounting rules interspersed throughout the book Introduction xv Chapter 1: Setting Up Your Company with the EasyStep Interview 1 Chapter 2: Setting Up and Using Payroll Features 27 Chapter 3: Adding or Changing Information After the Interview Is Completed 69 Chapter 4: Invoicing and Collecting Income 107 Chapter 5: Making Purchases and Recording Payments 141 Chapter 6: Collecting and Paying Sales Tax 171 Chapter 7: Using Time-Saving Features 185 Chapter 8: Job Cost Estimating and Tracking 199 Chapter 9: Tracking Time 219 Chapter 10: QuickBooks Tips and Tricks 237 Chapter 11: Using the QuickBooks Online Features 263 Chapter 12: Preparing Income Tax Returns 295 Chapter 13: Security 309 Chapter 14: Using Inventory Features 328 Chapter 15: Recording Your Assets 349 Chapter 16: Recording Owners' Equity 363 Chapter 17: Recording Liabilities 371 Chapter 18: Preparing the Top Ten QuickBooks Reports 387 Workshops 411 Index 423…”
Publicado 2009
Libro electrónico