Mostrando 125,961 - 125,980 Resultados de 127,182 Para Buscar 'Prowent~', tiempo de consulta: 1.71s Limitar resultados
  1. 125961
    Publicado 2024
    “…Learn how to simulate function overloading, embed hidden information within objects, develop self-contained functions capable of maintaining their own local state, generate number sequences using functional programming, handle exotic forms of IIFEs, and prevent loss of precision when dealing with large numbers. …”
    Libro electrónico
  2. 125962
    Publicado 2008
    “…But conventional approaches to active investing can be highly complex and time-consuming. Finally, there’s a proven, easy-to-use approach: one that’s simple enough for novices, quick enough for anyone, requires no background in math–and works! …”
    Libro electrónico
  3. 125963
    por Shapiro, David, 1954-
    Publicado 2004
    “…—Tim Freeman, President, Efficient Marketing, LLC Protect your retirement, one step at a time—starting today! …”
    Libro electrónico
  4. 125964
    Publicado 2007
    “…A widely respected networking security expert, Kunjal has published articles and presents infrastructure security, IP security, and managed security topics at Cisco Networkers events and at conferences such as the Asia Pacific Regional Internet Conference on Operational Technologies. …”
    Libro electrónico
  5. 125965
    por Moran, Mike, 1958-
    Publicado 2008
    “…He gives you a framework for getting over your fears of talking with your customers without a committee to protect your behind. Great book." –Robert Scoble Video blogger of the Scoble Show and Co-author of the top-selling corporate blogging book, Naked Conversations Start Fast, Fix Fast, and Fix Again: Marketing for Breakthrough Results For decades, marketers have been taught to carefully plan ahead because “you must get it right–it’s too expensive to change.” …”
    Libro electrónico
  6. 125966
    Publicado 2008
    “…Then, building on this strong foundation, the authors identify proven AJAX architectural patterns, and present case studies drawn from actual .NET and Java AJAX applications. …”
    Libro electrónico
  7. 125967
    por Damodaran, Aswath
    Publicado 2008
    “…Here, Damodaran helps you separate good risk (opportunities) from bad risk (threats), showing how to utilize the former while protecting yourself against the latter. He introduces powerful financial tools for evaluating risk, and demonstrates how to draw on other disciplines to make these tools even more effective. …”
    Libro electrónico
  8. 125968
    por Alger, Douglas
    Publicado 2005
    “…A comprehensive guide to designing and operating reliable server environments Keep your data center cool, clean, scalable, and secure Learn the five principles of effective data center design Avoid the natural and man-made hazards that can jeopardize a data center site Learn how to lay out key infrastructure objects within the data center for greatest efficiency, from buffer zones to server rows Apply proven installation methods by studying sample illustrations of both overhead and under-floor systems Extract the best practices and design strategies for both in-room and standby electrical infrastructure Avoid accidental downtime, improve productivity, and ensure user safety Safeguard and streamline your network infrastructure with a well-organized physical hierarchy Understand the special challenges of retrofitting overburdened server environments Implement solutions from a wide array of sample illustrations and examples of essential data center signage Safeguard servers with operations standards for people working in or visiting the data center Download templates used by Cisco to design its data centers, customizable to square footage and geography Avoid excess construction costs by designing a data center that meets your needs today and for many years to come All data centers are unique, but they all share the same mission: to protect your company’s valuable information. …”
    Libro electrónico
  9. 125969
    por Garfinkel, Simson
    Publicado 2002
    “…The book is divided into four major parts: Part I introduces the Mac OS X graphical user interface (Aqua) from a developer's point of view, Cocoa developer tools (such as the Interface Builder, Project Builder, and gdb debugger), object-oriented concepts, the Objective-C language in which Cocoa is written, and the basics of Cocoa programming itself. …”
    Libro electrónico
  10. 125970
    Publicado 2008
    “…She also is a guest instructor for Intuit at many trade shows throughout the year, and she writes published QuickBooks technical documentation and presentations for Intuit. Laura owns a software and accounting firm that has for more than 20 years helped a large variety of businesses manage their financials using Intuit’s QuickBooks software (Intuit’s Quicken in those early years). …”
    Libro electrónico
  11. 125971
    Publicado 2008
    “…—Lance Spitzner, Founder, Honeynet Project "Whether gathering intelligence for research and defense, quarantining malware outbreaks within the enterprise, or tending hacker ant farms at home for fun, you’ll find many practical techniques in the black art of deception detailed in this book. …”
    Libro electrónico
  12. 125972
    Publicado 2007
    “…Formulas and Functions with Microsoft® Office Excel 2007 demystifies worksheet formulas and presents the most useful Excel functions in an accessible, jargon-free way. …”
    Libro electrónico
  13. 125973
    Publicado 2008
    “…With his 30+ years of relevant experience, Steve McClellan tells you why and how to better protect yourself if you're an individual inve..…”
    Libro electrónico
  14. 125974
    Publicado 2008
    “…In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real. To protect against these hazards, you must understand them, and this groundbreaking book is the only comprehensive source of information on how to exploit computer games. …”
    Libro electrónico
  15. 125975
    Publicado 2008
    “….” – Diomidis Spinellis, author of Code Reading and Code Quality Software Expert Kent Beck Presents a Catalog of Patterns Infinitely Useful for Everyday Programming Great code doesn’t just function: it clearly and consistently communicates your intentions, allowing other programmers to understand your code, rely on it, and modify it with confidence. …”
    Libro electrónico
  16. 125976
    Publicado 2008
    “…Covers powerful DB2 9 enhancements ranging from automated management to improved compression Covers the full spectrum of DBA responsibilities, including server management, data placement, XML concepts, activity analysis, high availability, and security Presents expert tips and best practices from the DB2 customer support organization…”
    Libro electrónico
  17. 125977
    Publicado 2005
    “…I think this book complements other books, like Effective C++ by Scott Meyers. It presents everything in a concise and easy-to-read style.” …”
    Libro electrónico
  18. 125978
    “…Cisco NAC Appliance provides proactive protection at the network entry point. Cisco NAC Appliance provides you with all the information needed to understand, design, configure, deploy, and troubleshoot the Cisco NAC Appliance solution. …”
    Libro electrónico
  19. 125979
    Publicado 2007
    “…Whether you are preparing for CCVP certification or simply want to gain a better understanding of IP telephony and Cisco Unified CallManager, you will benefit from the foundation information presented in this book. Cisco IP Telephony (CIPT) , Second Edition, is part of a recommended learning path from Cisco Systems® that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. …”
    Libro electrónico
  20. 125980
    Publicado 2002
    “…This constraint-based routing approach feeds the network route traffic down one or more pathways, preventing unexpected congestion and enabling recovery from link or node failures. …”
    Libro electrónico