Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- History 1,308
- Historia 1,220
- Development 1,058
- Engineering & Applied Sciences 946
- Història 917
- Application software 868
- Management 860
- Computer Science 622
- Computer networks 462
- Leadership 443
- Data processing 438
- Computer programs 405
- Design 398
- Cloud computing 367
- Examinations 363
- Business & Economics 362
- Social aspects 358
- Security measures 351
- Education 344
- Bíblia 342
- Web site development 335
- Web sites 333
- Computer security 321
- Python (Computer program language) 321
- Politics and government 318
- Filosofía 314
- Photography 310
- Computer software 303
- Programming 297
- Crítica e interpretación 295
-
50381Publicado 2007“…75 8 Creating Videos 4 YouTube 89 9 Uploading Videos to YouTube 99 10 Managing Your Uploaded Videos 109 11 Who Owns What: Legal Issues with YouTube Videos 117 Part IV YouTube 4 Advanced Users 12 Joining the YouTube Community–and Creating Your Own Channel 133 13 Adding YouTube Videos to Your Own Site or Blog 153 14 Profiting from Your YouTube Videos 163 15 Getting More Out of YouTube–With Third-Party Tools 175 16 Troubleshooting YouTube Problems 183 Index 191…”
Libro electrónico -
50382por Mugridge, Rick“…Mugridge and Cunningham have written a useful and instructive book, which will become one of our course texts.” --Cem Kaner, Professor of Software Engineering, Florida Institute of Technology “Rick and Ward continue to amaze me. …”
Publicado 2005
Libro electrónico -
50383por Henderson, Ken“…"This is a book that deserves a prominent place by anyone who aspires to be a real professional developer of SQL Server applications." --from the Foreword by Ron Soukup The message of this book is that building stored procedures in Transact-SQL is very much like building programs in any other language. …”
Publicado 2002
Libro electrónico -
50384Publicado 2004“…This book provides a defensible,repeatable, and transferable decision-making process that will help thereader become more effective when spending his company's money." …”
Libro electrónico -
50385por Rosenblatt, Bill“…The new version, ksh93 , has the functionality of other scripting languages such as awk, icon, Perl, rexx, and tcl. Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. …”
Publicado 2002
Libro electrónico -
50386Publicado 2003“…Entity-relationship diagrams enabled database designers to convey the structure underlying the collection of tables and columns that made up a schema. From the beginning, technologists recognized the descriptive power inherent in visual representations of a system, yet it wasn't until 1997 that the first attempt to create a visual language that could be used across all aspects of a system development project came to fruition. …”
Libro electrónico -
50387por Day, Kevin, 1975-“…Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th..…”
Publicado 2003
Libro electrónico -
50388Publicado 2009Tabla de Contenidos: “…Cover -- Contents -- Introduction -- 1 Introduction to Object-Oriented Concepts -- Procedural Versus OO Programming -- Moving from Procedural to Object-Oriented Development -- Procedural Programming -- OO Programming -- What Exactly Is an Object? …”
Libro electrónico -
50389por Saita, FrancescoTabla de Contenidos: “…Bank Progress on Measuring Operational Risk; 5.6 The Role of Measures of Business Risk and Earnings at Risk; 5.7 Measuring Business Risk in Practice: Defining a Measure of Earnings at Risk; 5.8 From Earnings at Risk to Capital at Risk; 5.9 Summary; 5.10 Further Reading…”
Publicado 2007
Libro electrónico -
50390por Abelson, Harold“…Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation “Most writing about the digital world comes from techies writing about technical matter for other tech..…”
Publicado 2008
Libro electrónico -
50391Publicado 2006“…This book presents 151 quick and easy ways to meet these challenges in our daily lives. Each idea comes from the real world experiences of people like you—people who are experimenting with, examining, and discovering unique solutions to the time problems all of us face every day. …”
Libro electrónico -
50392Publicado 2013“…Leadership wisdom from West Point's Cadet Prayer…”
Libro electrónico -
50393Publicado 2009“…—Jeremy Geelan Conference Chair, Cloud Computing Conference and Expo series Sr. VP, SYS-CON Media and Events Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. …”
Libro electrónico -
50394Publicado 2011“…As Eclipse-based applications become increasingly popular, users are demanding more sophisticated graphical interfaces. …”
Libro electrónico -
50395por Bhatt, Samir“…Because of the flexibility offered by Liferay Portal for customizations, it is becoming a preferred best choice for portal implementations. …”
Publicado 2013
Libro electrónico -
50396Publicado 2011Tabla de Contenidos: “…From zero to deploy -- A demo app -- Mostly static pages -- Rails-flavored ruby -- Filling in the layout -- Modeling and viewing users, part I -- Modeling and viewing users, Part II -- Sign up -- Sign in, sign out -- Updating, showing, and deleting users -- User Microposts -- Following users…”
Libro electrónico -
50397por McDonald, Malcolm“…The book is established as essential reading for all serious professional marketers and students of marketing, from undergraduate and postgraduate to professional courses for bodies such as CIM. …”
Publicado 2011
Libro electrónico -
50398por Hartl, Michael“…';Ruby on Rails Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.' …”
Publicado 2012
Libro electrónico -
50399Publicado 2004“….” — Ben Shneiderman As 3D technology becomes available for a wide range of applications, its successful deployment will require well-designed user interfaces (UIs). …”
Libro electrónico -
50400por Trost, Ryan“…Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. …”
Publicado 2009
Libro electrónico