Mostrando 51,741 - 51,760 Resultados de 53,939 Para Buscar 'Trimen~', tiempo de consulta: 1.35s Limitar resultados
  1. 51741
    Publicado 2009
    “…Skušali smo zajeti najbolj značilne skalne oblike in skozi njih najbolj pomembne dejavnike in procese oblikovanja kraškega površja ter načine njihovega raziskovanja in najbolj izrazite primere. Širok spekter vsebine razkriva tudi nabor 49 avtorjev in primeri skalnih oblik s številnih kraških področji sveta. …”
    Libro electrónico
  2. 51742
    Publicado 2019
    “…En este libro se plantean dos tipos de problemas históricos. En primer término, fue notorio desde los primeros años de la década de 1990 que la periodización con que se explicaba el pasado dejaba muchos vacíos. …”
    Libro electrónico
  3. 51743
    por Vila Álvarez, Elena
    Publicado 2016
    “…., 2012), que permet per primer cop calcular de manera informatitzada l'anàlisi de coordenades polars…”
    Accés lliure
    Tesis
  4. 51744
    Publicado 2019
    “…Aquesta exploració es porta a terme en primer lloc aclarint el significat d'implementació i d'implementació efectiva, conceptes tots dos sobre els quals no existeix un consens. …”
    Accés lliure
    Tesis
  5. 51745
    por Gollapudi, Sunila
    Publicado 2013
    “…Therefore, organizations are quickly becoming more and more data driven. With the advent of Big Data, existing Data Warehousing and Business Intelligence solutions are becoming obsolete, and a requisite for new agile platforms consisting of all the aspects of Big Data has become inevitable. …”
    Libro electrónico
  6. 51746
    Publicado 2020
    Tabla de Contenidos: “…-- Key pain points and bottlenecks -- The components of the fiscal close -- Governing the fiscal close process -- The transaction accumulation, reconciliation and sub-ledger close -- Introduction to the standards of internal control -- Roles and responsibilities during the fiscal close -- The general ledger and trial balance -- The common chart of accounts -- Cost centers -- The journal entry process -- Spreadsheet controls -- Checklists for the transaction accumulation and sob-ledger close -- Sample policies for the transaction accumulation, reconciliation and subledger close -- Process narratives for the transaction accumulation, reconciliation and sub-ledger close process -- Standards of internal control for the transaction, accumulation, reconciliation and sub-ledger close process -- Corporate close and consolidation -- The number of consolidation points -- The number of closing cycles -- Post-closing entries -- Communication and accountability -- Financial statement assertions -- Checklists for the corporate close and consolidation process -- Sample policies for the corporate close and consolidation process -- Process narratives for the corporate close and consolidation process -- Standards of internal control for the corporate close and consolidation process -- Analysis and reporting (the final mile) -- Internal reporting and external reporting -- Budgeting and forecasting -- Reduce fiscal close cycle times by moving your finance function to "dynamic" budgeting and planning -- Fixed assets and the capital budget -- The forecast process -- The fiscal close and strategic planning -- Analytics to detect financial statement fraud -- Checklists for the analysis and reporting process -- Sample policies for the analysis and reporting process -- Process narratives for the analysis and reporting process -- Standards of internal control for the analysis and reporting process -- The virtual close : myth or reality? …”
    Libro electrónico
  7. 51747
    Executive's guide to personal security
    Executive's Guide to Personal Security
    Executive's Guide to Personal Security
    Publicado 2020
    “…New to the second edition is: Information for responding to an active shooter incident Enhanced details for protecting IP and computers and smart phones Strategies for planning for emergencies at home and the office Approaches to safety that meet the challenges of today’s world Executive's Guide to Personal Security, 2nd Edition is the comprehensive book that contains information on physical security, principles of route selection, technical security systems, hostage situations, emergency planning, hotel and room selection, armored products, communications, bomb threats, evacuations, and local criminal hazards…”
    Libro electrónico
  8. 51748
    Publicado 2019
    “…Innovation is lost under the pre-determined scope and forecasted environments of traditional project management. There is tremendous pressure on organizations to innovate, and the project managers responsible for managing these innovation projects do not have the training or tools to do their jobs effectively. …”
    Libro electrónico
  9. 51749
    Publicado 2019
    “…Key Features Gain a thorough understanding of the Metasploit Framework Develop the skills to perform penetration testing in complex and highly secure environments Learn techniques to integrate Metasploit with the industry's leading tools Book Description Most businesses today are driven by their IT infrastructure, and the tiniest crack in this IT network can bring down the entire business. …”
    Libro electrónico
  10. 51750
    Publicado 2020
    Tabla de Contenidos: “…Note continued: Set Up Family Sharing and Add Members -- Choose Date, Time, and International Settings -- ch. 3 Using Voice, Accessibility, and Continuity -- Give Commands with Siri -- Dictate Text Using Siri -- Gather and Share Information with Siri -- Configure Siri to Work Your Way -- Set Up VoiceOver to Identify Items On-Screen -- Configure Other Accessibility Features -- Using Your iPhone with Your Mac -- Using Your iPhone with Apple Watch -- ch. 4 Setting Up Communications -- Set Up Your Mail Accounts -- Control How Your E-Mail Appears -- Organize Your E-Mail Messages by Threads -- Set Your Default E-Mail Account -- Control How Your Contacts Appear -- Browse or Search for Contacts -- Create a New Contact -- Import Contacts from a SIM Card -- Choose Default Alert Options for Calendar Events -- Set Up and Use Wallet and Apple Pay -- Set Up and Use eSIMs -- ch. 5 Making Calls and Messaging -- Make Phone Calls and FaceTime Audio Calls…”
    Libro electrónico
  11. 51751
    Publicado 2018
    “…Stay in touch by phone, text, email, FaceTime Audio or FaceTime Video calls, or social media; download and enjoy books, music, movies, and more; take, edit, and manage photos; track your health, fitness, and habits; organize your schedule, your contacts, and your commitments; and much more! …”
    Libro electrónico
  12. 51752
    Publicado 2019
    “…Provides a comprehensive and updated study of GARCH models and their applications in finance, covering new developments in the discipline This book provides a comprehensive and systematic approach to understanding GARCH time series models and their applications whilst presenting the most advanced results concerning the theory and practical aspects of GARCH. …”
    Libro electrónico
  13. 51753
    Publicado 2011
    “…By using CERT-RMM, organizations can escape silo-driven approaches to managing operational risk and align to achieve strategic resilience management goals. …”
    Libro electrónico
  14. 51754
    por Feiler, Jesse
    Publicado 2012
    “…FileMaker® 12 In Depth Do more in less time! FileMaker 12 In Depth is the most comprehensive, coherent, and practical guide to creating professional-quality solutions with the newest versions of FileMaker! …”
    Libro electrónico
  15. 51755
    por Institute of Medicine (U.S.).
    Publicado 2010
    “…The Institute of Medicine Roundtable on Value & Science-Driven Health Care's vision for a learning healthcare system, in which evidence is applied and generated as a natural course of care, is premised on the development of a research capacity that is structured to provide timely and accurate evidence relevant to the clinical decisions faced by patients and providers. …”
    Libro electrónico
  16. 51756
    Publicado 2006
    “…Readers will learn How the Configuration Application Block is designed and can be used at runtime to easily read and write configuration data How the Configuration Application Block works at design time for all blocks How to use the Data Access Block to create a portable data layer How to use the Exception Handling Application Block to implement a policy-driven, application-wide exception handling system How to use the Logging and Instrumentation Application Block to log and instrument messages independent of the message destination How to add authentication, authorization, role membership, security cache, and profile membership features to an application with the Security Application Block How to use the Cryptography Application Block to add functionality to encrypt and decrypt data and create and compare hashes How to build your own application block and providers that “snap” right into Enterprise Library Whether you plan to extend Enterprise Library for your organization, or just use the existing application blocks to add functionality to your architecture in a consistent, extensible, integrated way, this book will guide you through the complexities and help you find a clear path to success…”
    Libro electrónico
  17. 51757
    por Fernández, Hans, author
    Publicado 2022
    “…La presente monografía constituye el primer estudio panorámico sobre el estado de los spectators en América Latina, que amplía el conocimiento de lo que hasta ahora se sabía sobre el género en Europa. …”
    Libro electrónico
  18. 51758
    Publicado 2022
    “…It covers the following themes: ‘Kéba Mbaye in African approaches to international law’, ‘international legal theory’, ‘international human rights law’, ‘international environmental and criminal law’ and ‘teaching of international law’. …”
    Libro electrónico
  19. 51759
    Publicado 2022
    “…Though knowledge of these disparities has increased significantly over the past decade, glaring gaps remain, often driven by a lack of reliable data. Measuring Sex, Gender Identity, and Sexual Orientation recommends that the National Institutes of Health (NIH) adopt new practices for collecting data on sex, gender, and sexual orientation - including collecting gender data by default, and not conflating gender with sex as a biological variable. …”
    Libro electrónico
  20. 51760
    por Alvarado L, Claudia
    Publicado 2021
    “…En su obra Les Chasseurs-cueilleurs ou l’origine des inégalrtés (1982), Alain Testart insiste en el papel que la práctica del almacenamiento pudo haber cobrado en el origen de las desigualdades en el seno de los grupos humanos, en particular entre las bandas de cazadores recolectores y, especialmente, aquellas más o menos sedentarizadas. …”
    Electrónico