|
|
|
|
|
Mastering Revit Architecture 2009Move beyond the basics of Revit and BIM and redefine your designs with this new edition of Mastering Revit Architecture. With updated coverage of Revit Architecture 2009 features, this comprehensive guide will help you discover best practices and tips that will make your projects smoother and their implementation easier. You’ll learn... | | The iPad for Photographers: Master the Newest Tool in Your Camera Bag
Photographers carry gear. It doesn’t matter whether you’re a pro with
multiple camera bodies and lenses or a casual shooter with an ever-present
point-and-shoot camera—there’s always stuff to pack along. And if you’re
traveling or away from your office or studio, part of that gear typically... | | |
|
| | Remote Sensing of the Asian Seas
A wide variety of marginal basins, ranging from polar to equatorial regions, and a few sizeable enclosed basins, can all be included among the Asian Seas. The Arctic Ocean shelf seas off Siberia; the sheltered basins along the Pacific Ocean’s western rim; the coastal seas of the northernmost Indian Ocean, including the semi-enclosed Red... | | |
|
Inbound Marketing For Dummies
Don't chase business—bring new customers to you!
Outdated sales tactics have you chasing leads and fishing for new business. In today's competitive world, nobody has time for that! Inbound Marketing For Dummies is a one-stop-shop for everything you need to know about inbound marketing techniques that... | | Naked Employee, The: How Technology Is Compromising Workplace PrivacyMost people would be startled to know the many ways in which their employers are capable of intruding on privacy. Huge technological advances are steadily shrinking workers’ personal space, and it’s up to individuals to know which parts of their daily lives may fall under the corporate magnifying glass.
Corporations have the... | | The Effective Incident Response TeamWhen an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |