Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building a Buzz: Libraries and Word-of-mouth Marketing

Buy

Want to get the word out about your library in the most cost-effective way possible? You can achieve this with the effective word-of-mouth marketing (WOMM) strategies laid out in this book. Two creative marketers, Peggy Barber and Linda Wallace, bring you sound marketing principles to spread the word about your library within the community with: a strategy that works for you, WOMM must-haves, tips to effectively deliver your message, and best practices and insightful reviews. Renown for their creativity, Barber and Wallace bring you WOMM ideas that will help you turn your existing library patrons into a major marketing force.

(HTML tags aren't allowed.)

24P: Make Your Digital Movies Look Like Hollywood
24P: Make Your Digital Movies Look Like Hollywood
The digital video mode 24p captures imagery more nearly the way motion picture cameras do. It opens up a world of possibilities for digital filmmakers. But aspiring to 'film-look video' involves more than just flipping a switch on your camera. The authors share the secrets of Hollywood-style production so you can give your movie a truly polished,...
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
Network Programming in Windows NT
Network Programming in Windows NT

Sinha explains the use of Windows and Windows NT inter-process communication methods to build applications which can communicate with their counterparts over the network. This book explores the challenges that developers face when they are developing network-aware or client/server programs within the Windows and Windows NT operating systems.

...

Hardening Linux
Hardening Linux

Take a proactive approach to Enterprise Linux security by implementing preventive measures against attacks—before they occur. Written by a team of Linux security experts, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Features include examples using Red...

The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century
The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century

With his classics of social commentary The Geography of Nowhere and Home from Nowhere, James Howard Kunstler has established himself as one of the great commentators on American space and place. Now, with The Long Emergency, he offers a shocking vision of a post-oil future. As a result of artificially cheap fossil-fuel energy, we have...

Cassandra: The Definitive Guide
Cassandra: The Definitive Guide

What could you do with data if scalability wasn't a problem? With this hands-on guide, you'll learn how Apache Cassandra handles hundreds of terabytes of data while remaining highly available across multiple data centers -- capabilities that have attracted Facebook, Twitter, and other data-intensive companies. Cassandra:...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy