Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 3,441
- Development 2,745
- History 2,709
- Application software 2,127
- Management 1,940
- Engineering & Applied Sciences 1,776
- Gestió de projectes 1,510
- Computer networks 1,289
- Data processing 1,177
- Security measures 1,169
- Computer Science 1,146
- Filosofía 1,108
- Computer security 1,090
- Prevention 1,063
- TFM 1,037
- Computer programs 1,006
- Business & Economics 925
- Artificial intelligence 903
- Computer software 902
- Cloud computing 896
- Education 875
- Design 873
- Història 872
- Universidad Pontificia de Salamanca (España) 860
- Social aspects 807
- Crítica e interpretación 796
- Python (Computer program language) 795
- Project management 784
- Web site development 771
- Computer programming 756
-
125961Publicado 2024“…Learn how to simulate function overloading, embed hidden information within objects, develop self-contained functions capable of maintaining their own local state, generate number sequences using functional programming, handle exotic forms of IIFEs, and prevent loss of precision when dealing with large numbers. …”
Libro electrónico -
125962Publicado 2008“…But conventional approaches to active investing can be highly complex and time-consuming. Finally, there’s a proven, easy-to-use approach: one that’s simple enough for novices, quick enough for anyone, requires no background in math–and works! …”
Libro electrónico -
125963por Shapiro, David, 1954-“…—Tim Freeman, President, Efficient Marketing, LLC Protect your retirement, one step at a time—starting today! …”
Publicado 2004
Libro electrónico -
125964Publicado 2007“…A widely respected networking security expert, Kunjal has published articles and presents infrastructure security, IP security, and managed security topics at Cisco Networkers events and at conferences such as the Asia Pacific Regional Internet Conference on Operational Technologies. …”
Libro electrónico -
125965por Moran, Mike, 1958-“…He gives you a framework for getting over your fears of talking with your customers without a committee to protect your behind. Great book." –Robert Scoble Video blogger of the Scoble Show and Co-author of the top-selling corporate blogging book, Naked Conversations Start Fast, Fix Fast, and Fix Again: Marketing for Breakthrough Results For decades, marketers have been taught to carefully plan ahead because “you must get it right–it’s too expensive to change.” …”
Publicado 2008
Libro electrónico -
125966Publicado 2008“…Then, building on this strong foundation, the authors identify proven AJAX architectural patterns, and present case studies drawn from actual .NET and Java AJAX applications. …”
Libro electrónico -
125967por Damodaran, Aswath“…Here, Damodaran helps you separate good risk (opportunities) from bad risk (threats), showing how to utilize the former while protecting yourself against the latter. He introduces powerful financial tools for evaluating risk, and demonstrates how to draw on other disciplines to make these tools even more effective. …”
Publicado 2008
Libro electrónico -
125968por Alger, Douglas“…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
Publicado 2005
Libro electrónico -
125969por Garfinkel, Simson“…The book is divided into four major parts: Part I introduces the Mac OS X graphical user interface (Aqua) from a developer's point of view, Cocoa developer tools (such as the Interface Builder, Project Builder, and gdb debugger), object-oriented concepts, the Objective-C language in which Cocoa is written, and the basics of Cocoa programming itself. …”
Publicado 2002
Libro electrónico -
125970Publicado 2008“…She also is a guest instructor for Intuit at many trade shows throughout the year, and she writes published QuickBooks technical documentation and presentations for Intuit. Laura owns a software and accounting firm that has for more than 20 years helped a large variety of businesses manage their financials using Intuit’s QuickBooks software (Intuit’s Quicken in those early years). …”
Libro electrónico -
125971Publicado 2008“…—Lance Spitzner, Founder, Honeynet Project "Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you’ll find many practical techniques in the black art of deception detailed in this book. …”
Libro electrónico -
125972Publicado 2007“…Formulas and Functions with Microsoft® Office Excel 2007 demystifies worksheet formulas and presents the most useful Excel functions in an accessible, jargon-free way. …”
Libro electrónico -
125973Publicado 2008“…With his 30+ years of relevant experience, Steve McClellan tells you why and how to better protect yourself if you're an individual inve..…”
Libro electrónico -
125974Publicado 2008“…In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. …”
Libro electrónico -
125975Publicado 2008“….” – Diomidis Spinellis, author of Code Reading and Code Quality Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. …”
Libro electrónico -
125976Publicado 2008“…Covers powerful DB2 9 enhancements ranging from automated management to improved compression Covers the full spectrum of DBA responsibilities, including server management, data placement, XML concepts, activity analysis, high availability, and security Presents expert tips and best practices from the DB2 customer support organization…”
Libro electrónico -
125977Publicado 2005“…I think this book complements other books, like Effective C++ by Scott Meyers. It presents everything in a concise and easy-to-read style.” …”
Libro electrónico -
125978“…Cisco NAC Appliance provides proactive protection at the network entry point. Cisco NAC Appliance provides you with all the information needed to understand, design, configure, deploy, and troubleshoot the Cisco NAC Appliance solution. …”
Libro electrónico -
125979Publicado 2007“…Whether you are preparing for CCVP certification or simply want to gain a better understanding of IP telephony and Cisco Unified CallManager, you will benefit from the foundation information presented in this book. Cisco IP Telephony (CIPT) , Second Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. …”
Libro electrónico -
125980Publicado 2002“…This constraint-based routing approach feeds the network route traffic down one or more pathways, preventing unexpected congestion and enabling recovery from link or node failures. …”
Libro electrónico