Mostrando 50,381 - 50,400 Resultados de 51,519 Para Buscar 'ZCom~', tiempo de consulta: 0.91s Limitar resultados
  1. 50381
    Publicado 2007
    “…75 8 Creating Videos 4 YouTube 89 9 Uploading Videos to YouTube 99 10 Managing Your Uploaded Videos 109 11 Who Owns What: Legal Issues with YouTube Videos 117 Part IV YouTube 4 Advanced Users 12 Joining the YouTube Community–and Creating Your Own Channel 133 13 Adding YouTube Videos to Your Own Site or Blog 153 14 Profiting from Your YouTube Videos 163 15 Getting More Out of YouTube–With Third-Party Tools 175 16 Troubleshooting YouTube Problems 183 Index 191…”
    Libro electrónico
  2. 50382
    por Mugridge, Rick
    Publicado 2005
    “…Mugridge and Cunningham have written a useful and instructive book, which will become one of our course texts.” --Cem Kaner, Professor of Software Engineering, Florida Institute of Technology “Rick and Ward continue to amaze me. …”
    Libro electrónico
  3. 50383
    por Henderson, Ken
    Publicado 2002
    “…"This is a book that deserves a prominent place by anyone who aspires to be a real professional developer of SQL Server applications." --from the Foreword by Ron Soukup The message of this book is that building stored procedures in Transact-SQL is very much like building programs in any other language. …”
    Libro electrónico
  4. 50384
    Publicado 2004
    “…This book provides a defensible,repeatable, and transferable decision-making process that will help thereader become more effective when spending his company's money." …”
    Libro electrónico
  5. 50385
    por Rosenblatt, Bill
    Publicado 2002
    “…The new version, ksh93 , has the functionality of other scripting languages such as awk, icon, Perl, rexx, and tcl. Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. …”
    Libro electrónico
  6. 50386
    Publicado 2003
    “…Entity-relationship diagrams enabled database designers to convey the structure underlying the collection of tables and columns that made up a schema. From the beginning, technologists recognized the descriptive power inherent in visual representations of a system, yet it wasn't until 1997 that the first attempt to create a visual language that could be used across all aspects of a system development project came to fruition. …”
    Libro electrónico
  7. 50387
    por Day, Kevin, 1975-
    Publicado 2003
    “…Technical and non-technical IT professionals alike can apply Day's concepts and strategies to become security gurus, while seasoned practitioners will benefit from th..…”
    Libro electrónico
  8. 50388
    Publicado 2009
    Tabla de Contenidos: “…Cover -- Contents -- Introduction -- 1 Introduction to Object-Oriented Concepts -- Procedural Versus OO Programming -- Moving from Procedural to Object-Oriented Development -- Procedural Programming -- OO Programming -- What Exactly Is an Object? …”
    Libro electrónico
  9. 50389
    por Saita, Francesco
    Publicado 2007
    Tabla de Contenidos: “…Bank Progress on Measuring Operational Risk; 5.6 The Role of Measures of Business Risk and Earnings at Risk; 5.7 Measuring Business Risk in Practice: Defining a Measure of Earnings at Risk; 5.8 From Earnings at Risk to Capital at Risk; 5.9 Summary; 5.10 Further Reading…”
    Libro electrónico
  10. 50390
    por Abelson, Harold
    Publicado 2008
    “…Miller , Senior Director for Technology Policy and Strategy, Microsoft Corporation “Most writing about the digital world comes from techies writing about technical matter for other tech..…”
    Libro electrónico
  11. 50391
    Publicado 2006
    “…This book presents 151 quick and easy ways to meet these challenges in our daily lives. Each idea comes from the real world experiences of people like you—people who are experimenting with, examining, and discovering unique solutions to the time problems all of us face every day. …”
    Libro electrónico
  12. 50392
    Publicado 2013
    “…Leadership wisdom from West Point's Cadet Prayer…”
    Libro electrónico
  13. 50393
    Publicado 2009
    “…—Jeremy Geelan Conference Chair, Cloud Computing Conference and Expo series Sr. VP, SYS-CON Media and Events Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. …”
    Libro electrónico
  14. 50394
    Publicado 2011
    “…As Eclipse-based applications become increasingly popular, users are demanding more sophisticated graphical interfaces. …”
    Libro electrónico
  15. 50395
    por Bhatt, Samir
    Publicado 2013
    “…Because of the flexibility offered by Liferay Portal for customizations, it is becoming a preferred best choice for portal implementations. …”
    Libro electrónico
  16. 50396
    Publicado 2011
    Tabla de Contenidos: “…From zero to deploy -- A demo app -- Mostly static pages -- Rails-flavored ruby -- Filling in the layout -- Modeling and viewing users, part I -- Modeling and viewing users, Part II -- Sign up -- Sign in, sign out -- Updating, showing, and deleting users -- User Microposts -- Following users…”
    Libro electrónico
  17. 50397
    por McDonald, Malcolm
    Publicado 2011
    “…The book is established as essential reading for all serious professional marketers and students of marketing, from undergraduate and postgraduate to professional courses for bodies such as CIM. …”
    Libro electrónico
  18. 50398
    por Hartl, Michael
    Publicado 2012
    “…';Ruby on Rails Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.' …”
    Libro electrónico
  19. 50399
    Publicado 2004
    “….” — Ben Shneiderman As 3D technology becomes available for a wide range of applications, its successful deployment will require well-designed user interfaces (UIs). …”
    Libro electrónico
  20. 50400
    por Trost, Ryan
    Publicado 2009
    “…Coverage includes Assessing the strengths and limitations of mainstream monitoring tools and IDS technologies Using Attack Graphs to map paths of network vulnerability and becoming more proactive about preventing intrusions Analyzing network behavior to immediately detect polymorphic worms, zero-day exploits, and botnet DoS attacks Understanding the theory, advantages, and disadvantages of the latest Web Application Firewalls Implementing IDS/IPS systems that protect wireless data traffic Enhancing your intrusion detection efforts by converging with physical security defenses Identifying attackers’ “geographical fingerprints” and using that information to respond more effectively Visualizing data traffic to identify suspicious patterns more quickly Revisiting intrusion detection ROI in light of new threats, compliance risks, and technical alternatives Includes contributions from these leading network security experts: Jeff Forristal, a.k.a. …”
    Libro electrónico