Search:

Blog marketing : the revolutionary new way to increase sales, build your brand, and get exceptional results / by Wright, Jeremy.(GaAaGPL)13031609;
Includes bibliographical references (pages 307-308) and index.All companies, large and small, know that reaching customers directly is essential to success. This book reveals how any company can use blogs to raise its visibility and transform internal communications.
Subjects: Marketing; Blogs; Marketing.; Web log.; Social media.;
Available copies: 1 / Total copies: 1
unAPI

Effective blogging for libraries / by Crosby, Connie,1964-(GaAaGPL)13062087; Library and Information Technology Association (U.S.)(GaAaGPL)12814235;
Includes bibliographical references (pages 125-131) and index.Introduction : blogging basics -- Planning -- Implementation -- Marketing -- Best practices -- Measures of success.Explains how blogging can be used to enhance the library-user connection, with an overview of blogging and tips on how librarians can use a blog to promote programs, build a broader user base, and highlight collection changes.
Subjects: Libraries; Librarians; Libraries; Libraries; Library Web sites; Library Science; Blogging.; Marketing; Internet.; Communications Media.; Bibliotheken.; Internet.; Weblogs.; Bibliothek.; Web log.; Bibliothekar.; Marketing.; Öffentlichkeitsarbeit.; Social media.;
Available copies: 1 / Total copies: 1
unAPI

Tell no one / by Coben, Harlan,1962-;
Eight years ago David Beck was knocked unconscious and left for dead, and his wife Elizabeth was kidnapped and murdered. For the next eight years Dr Beck re-lived the horror of what happened that day every day of his life. Then one afternoon, he receives an anonymous e-mail telling him to log on to a certain web site at a certain time, using a code that only he and his wife knew. The screen opens onto a web cam and it is Elizabeth's image he sees. Is it a practical joke? But as Beck tries to find out if Elizabeth is truly alive and what really happened the night she disappeared, the FBI are trying to pin Elizabeth's murder on him, and everyone he turns to seems to end up dead ...
Subjects: Fiction.; Mystery fiction.; Fiction.; MYSTERY FICTION.; Physicians; Physicians.; Physicians; Mystery fiction.; David Beck (fictitious character);
Available copies: 1 / Total copies: 1
unAPI

Windows 11 all-in-one / by Rusen, Ciprian Adrian,author.(GaAaGPL)13237079;
Filled with tweaks, tips and troubleshooting tricks, this must-have resource to Windows 11 shows you, through step-by-step instructions, how to dig through Microsoft's ubiquitous operating system and get the most out of the latest version.
Subjects: Instructional and educational works.; Handbooks and manuals.; Instructional and educational works.; Handbooks and manuals.; Matériel d'éducation et de formation.; Guides et manuels.; Handbook.; Microsoft Windows (Computer file); Operating systems (Computers); Operating systems (Computers); Systèmes d'exploitation (Ordinateurs); Systèmes d'exploitation (Ordinateurs); operating systems.; COMPUTERS / Operating Systems / Windows Desktop.; COMPUTERS / Operating Systems / General.; COMPUTERS / Programming / Microsoft.; Microsoft Windows (Computer file); Operating systems (Computers);
Available copies: 1 / Total copies: 1
unAPI

Swiped : how to protect yourself in a world full of scammers, phishers, and identity thieves / by Levin, Adam.(GaAaGPL)13232795;
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers. Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them.An overview of the problem. What's in a name (and a number)? ; A short history of identity (and fraud) : (and you thought it was just about credit cards) ; Swiping happens -- The basics of what you can do. Understanding the problem is the solution ; The three Ms -- The many types of identity theft. Spies in your home : how the Internet of Things may violate your privacy, threaten your security, and ruin your credit ; A taxing situation ; It's a hard-knock life : child identity theft ; May the farce be with you : social media dos and don'ts ; From dangerous to deadly : on healthcare scams and medical identity theft ; Wanted dead or alive : (but it's easier if you're dead) ; Culture eats strategy : business considerations ; The three Ms for companies : you must build it because they will come ; The highest law -- Resources and terms. Appendix 1. Fraud stories -- Appendix 2. A glossary of scams -- Appendix 3. Identity theft and the deceased : prevention and victim tips -- Appendix 4. Request a credit report for the deceased -- Appendix 5. Deceased affidavit of fact.
Subjects: Identity theft.; Phishing.; Swindlers and swindling.; Computers; Swindlers and swindling.;
Available copies: 1 / Total copies: 1
unAPI

Wallander. by Wilson, Andy,1958-(GaAaGPL)13208149; producerMoseley, Simon.(GaAaGPL)13206459; Ahlqvist, Daniel,producer.(GaAaGPL)13233145; actorHiddleston, Tom.(GaAaGPL)13233967; Caron, Benjamin,director.(GaAaGPL)13336586; Shimmin, Sadie,actor.(GaAaGPL)13319985; Branagh, Kenneth,actor.(GaAaGPL)13346596; Warner, David,1941-2022,actor.(GaAaGPL)12883366; Spark, Jeany,1982-actor.(GaAaGPL)13233326; Kay, Barnaby,actor.(GaAaGPL)13192021; Smart, Sarah,1977-actor.(GaAaGPL)13233327; Television adaptation of (work)Mankell, Henning,1948-2015.Mördare utan ansikte.; Television adaptation of (work)Mankell, Henning,1948-2015.Mannen som log.; Television adaptation of (work)Mankell, Henning,1948-2015.Femte kvinnan.; McCabe, Richard,actor.(GaAaGPL)13209737; Left Bank Pictures.(GaAaGPL)13226050; Yellow Bird (Firm)(GaAaGPL)13233272; TKBC (Firm); Degeto Films (Firm)(GaAaGPL)13244209; WGBH (Television station : Boston, Mass.)(GaAaGPL)12803896; Film i Skåne.; BBC Video (Firm)(GaAaGPL)13151556; 2 Entertain (Firm)(GaAaGPL)13203658; Warner Home Video (Firm)(GaAaGPL)13147770; British Broadcasting Corporation,publisher.(GaAaGPL)12786207;
DVD, widescreen presentation; Region 1.Kenneth Branagh, Richard McCabe, Jeany Spark, Barnaby Kay, David Warner, Sarah Smart, Sadie Shimmin, Tom Hiddleston.In The White Lioness, Wallander is drawn into the case of a missing Swedish national while attending a police conference in South Africa. The second film sees Wallander back in Sweden, where a woman's body is discovered half buried in the forest swamps. And in The Troubled Man, Wallander is in a race against time as he embarks on his final case - the disappearance of his daughter's father-in-law.
Subjects: Detective and mystery television programs.; Fiction television programs.; Television series.; Television adaptations.; Video recordings for the hearing impaired.; Detective and mystery television programs.; Drama.; Fiction television programs.; Television adaptations.; Television series.; Video recordings for the hearing impaired.; Wallander, Kurt (Fictitious character); Police; Criminal investigation; Mankell, Henning, 1948-2015; Murder; Crime;
Available copies: 1 / Total copies: 1
unAPI