- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Lecture Fundamental accounting principles (21e) - Chapter 12: Accounting for partnerships
Lecture Fundamental accounting principles (21e) - Chapter 12: Accounting for partnerships. After completing this chapter you should be able to: Identify the principles and components of accounting information systems, explain the goals and uses of special journals, describe the use of controlling accounts and subsidiary ledgers.
39 p dtu 23/09/2023 24 0
Từ khóa: Fundamental system principles, Technology-based accounting systems, Fundamental accounting principles, Lecture Fundamental accounting principles, Accounting information systems
Internetworking With TCP/IP-Douglas Comer
Internetworking: an overview of concepts, terminology, and technology underlying the TCP/IP Internet protocol suite and the architecture of an internet. This best-selling, conceptual introduction to TCP/IP internetworking protocols interweaves a clear discussion of fundamentals with the latest technologies. Leading author Doug Comer covers layering and shows how all protocols in the TCP/IP suite fit into the five-layer model. With a new focus...
858 p dtu 25/09/2012 227 1
Từ khóa: Internetworking, TCP/IP, information technology, Douglas Comer, components of the IAB organization, RFCs, network hardware review, ethernet frame format
Praise for the First Edition “I sure wish I had this book ten years ago. Some might think that I don’t need any Java books, but I need this one.” —James Gosling, fellow and vice president, Sun Microsystems, Inc., and inventor of the Java programming language “An excellent book, crammed with good advice on using the Java programming language and object-oriented programming in general.” —Gilad Bracha, distinguished engineer,...
369 p dtu 25/09/2012 183 2
Từ khóa: Effective java, information technology, programming java, class and interface, generics, enums and annotations, creating and destroying objects, methods common to all object,
Cloud computing has been a popular topic lately, including the discussion of various cloud computing solutions such as Amazon AWS, Google App Engine, and Salesforce.com. Many of the discussions revolve around enterprise IT, but few are talking about what this means for startups. In this eBook, we'll cover the following topics: • • • • • A simple definition of cloud computing The five types of cloud computing How to determine if cloud...
25 p dtu 22/09/2012 167 1
Từ khóa: Cloud computing for starups, internet, information technology, software as a service (SAAS), oprations as service (OAAS), launch any, the five types of cloud computing,
Methods of the XmlNode Class Description Adds the specified node to the list of children of the current node. The node is inserted at the bottom of the list. Creates a duplicate of the current node. For element nodes, duplication includes child nodes and attributes. Creates a duplicate of the current node. Takes a Boolean argument indicating whether cloning should proceed recursively. If this argument is true, calling the CloneNode method is...
240 p dtu 20/09/2012 239 2
Từ khóa: Applied xml programming for ms .Net, information technology, XML readers, XML core classes in the .Net Frameword, XML Data Manipulation, XML and Data Access, Applications Interoperability, XML Web Services, The .NET Remoting System
For students writing applications that run over TCP/IP, or for those responsible for managing and maintaining a TCP/IP internet, this book's innovative approach helps readers at all levels to truly understand how TCP/IP really works. Rather than just describing the protocols from an abstract, standards-related point of view-describing what the standards say the protocol suite should do-TCP/IP Illustrated, Volume 1 actually shows the protocols...
267 p dtu 20/09/2012 201 1
Từ khóa: TCP/IP illustrated, information technology, internet protocol, dynamic routing protocols IP routing, ping program,
A Brief History of Security “Well, I never heard it before,” said the Mock Turtle, “but it sounds uncommon nonsense.” —Lewis Carroll, Alice in Wonderland. Secret communication achieved by hiding the existence of a message is known as steganography. The word is derived from the Greek word “steganos,” meaning cov- ered and “graphin” meaning to write.
273 p dtu 16/05/2012 191 1
Từ khóa: wireless security, network security, information technology, internet, networking, network administrator, security, IP network
This chapter helps you prepare for the exam by covering the following Planning objective: Given a scenario, identify valid network configurations. . This is a very general objective as there are many aspects of a valid network configuration. Essentially, this objective indicates that you will need to have the background provided by the Networking Essentials exam and understand what configurations of TCP/IP are valid. . This chapter...
624 p dtu 16/05/2012 197 1
Từ khóa: network systems, information technology, network management, computer learning materials, InterNetworking, Planning