1.

Record Nr.

UNINA9910456951203321

Autore

Fredericks Karen

Titolo

Sage Act! 2011 [[electronic resource] ] : dashboard and report cookbook / / Karen Fredericks, Roy Laudenslager

Pubbl/distr/stampa

Birmingham, UK, : Packt Enterprise Pub., c2011

ISBN

1-283-01296-0

9786613012968

1-84968-193-7

Descrizione fisica

1 online resource (216 p.)

Altri autori (Persone)

LaudenslagerRoy

Disciplina

650

658.812028553

Soggetti

Time management - Computer programs

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Cover; Coyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Exploring the ACT! Reports; Introduction; Using the ACT! Reports menu; Using the Reports view; Running a Report from the Report view; Choosing a Report Output Option; Editing Reports in the Reports view; Keeping a list of Favorite Reports; Finding the default location of the ACT! Reports; Chapter 2: Filtering Data in Reports; Introduction; Filtering based on a contact field lookup; Filtering Contact reports; Filtering based on a contact activity lookup

Filtering Notes and History in reportsFiltering activities in reports; Filtering Groups reports; Filtering Company reports; Filtering Opportunity reports; Preset filters for most used option; Chapter 3: Creating a Quick Report; Introduction; Setting preferences for the quick reports; Selecting and organizing the columns for a Contact List Quick Report; Printing the Contact List Quick Report; Printing the History tab quick report; Printing the Contact Detail View Quick Report; Exporting the Opportunities List View to Excel; Chapter 4: Working with the Report Editor; Introduction

Converting ACT! 6 custom reportsChoosing a template type and setting



defaults; Adding fields to template and basic formatting; Naming field objects and individual field formatting; Positioning fields and labels; Adding a custom field and creating a basic script; Adding sections for sorting and grouping; Using sections for sub-totaling and totaling; Chapter 5: Subreports and Scripting Techniques; Introduction; Formatting a List Type report; Adding subreports to a report; Add fields to the secondary contacts subreport; Adding fields to the history subreport; Scripting basics by example

Reverse engineering a set of complex scriptsChapter 6: Labels and Envelopes; Introduction; Editing a standard envelope; Adding a logo to an envelope; Creating a custom envelope; Creating an xx64 label template; Chapter 7: Working with the ACT! Dashboards; Introduction; Getting familiar with the Dashboard layouts; Accessing information from Dashboards; Copying Dashboard information to other products; Printing Dashboards; Making Dashboards the default startup preference; Chapter 8: Filtering Dashboards; Introduction; Filtering Contacts Dashboards; Filtering Activity Dashboards

Filtering Opportunity DashboardsFiltering the Admin Dashboard; Changing the Dashboard Data; Chapter 9: Editing Existing Dashboards; Introduction; Cloning an existing Dashboard; Changing the Dashboard display type; Changing the Dashboard default filters; Changing the Dashboard headers and footers; Changing the Dashboard legends; Changing the Dashboard totals; Changing the Dashboard scales and limits; Setting a Dashboard target; Modifying the closed sales to date component; Changing the Dashboard data charts; Chapter 10: Working with the Dashboard Designer; Introduction

Creating a new Dashboard

Sommario/riassunto

Over 65 simple and incredibly effective recipes for creating and customizing exciting dashboards and reports from your Sage ACT! data using this book and eBook



2.

Record Nr.

UNINA9910508444103321

Titolo

Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part III / / edited by Kobbi Nissim, Brent Waters

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021

ISBN

3-030-90456-3

Edizione

[1st ed. 2021.]

Descrizione fisica

1 online resource (525 pages)

Collana

Security and Cryptology, , 2946-1863 ; ; 13044

Disciplina

005.824

Soggetti

Cryptography

Data encryption (Computer science)

Coding theory

Information theory

Application software

Computer networks

Data protection

Cryptology

Coding and Information Theory

Computer and Information Systems Applications

Computer Communication Networks

Data and Information Security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Covert Learning: How to Learn with an Untrusted Intermediary -- Random-Index PIR and Applications -- Forward Secret Encrypted RAM: Lower Bounds and Applications -- Laconic Private Set Intersection and Applications -- Amortizing Rate-1 OT and Applications to PIR and PSI -- Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security -- Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption -- Grafting Key Trees: Efficient Key Management for Overlapping Groups -- Updatable Public Key Encryption in the Standard Model -- Towards Tight Adaptive Security of



Non-Interactive Key Exchange -- On the Impossibility of Purely Algebraic Signatures -- Policy-Compliant Signatures -- Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions -- Non-Malleable Vector Commitments via Local Equivocability -- Non-Malleable Time-Lock Puzzles and Applications -- Vector and Functional Commitments from Lattices.-.

Sommario/riassunto

The three-volume set LNCS 13042, LNCS 13043 and LNCS 13044 constitutes the refereed proceedings of the 19th International Conference on Theory of Cryptography, TCC 2021, held in Raleigh, NC, USA, in November 2021. The total of 66 full papers presented in this three-volume set was carefully reviewed and selected from 161 submissions. They cover topics on proof systems, attribute-based and functional encryption, obfuscation, key management and secure communication.