Résultats de la recherche - "Stephen King"

  • Résultat(s) 1 - 17 résultats de 17
Affiner les résultats
  1. 1

    Stephen King a critical companion / par Russell, Sharon A., 1941-

    Publié 1996
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  2. 2

    Revisiting Stephen King a critical companion / par Russell, Sharon A., 1941-

    Publié 2002
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  3. 3
  4. 4

    Stephen King on the small screen par Browning, Mark, 1966-

    Publié 2011
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  5. 5

    King Stephen par King, Edmund

    Publié 2010
    Sujets: “…Stephen, King of England, 1097?-1154.…”
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  6. 6

    Stephen King as a postmodern author par Landais, Clotilde, 1975-

    Publié 2012
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  7. 7

    The green mile / par King Stephen

    Publié 1996
    Livre
  8. 8

    Dolores Claiborne / par King, Stephen

    Publié 1993
    Livre
  9. 9

    Cell : a novel / par King, Stephen

    Publié 2006
    Livre
  10. 10

    Under the dome : a novel / par King, Stephen

    Publié 2009
    Livre
  11. 11

    Thinner / par Bachman, Richard

    Publié 1984
    Cassette Audio
  12. 12

    From a buick 8 : a novel / par King, Stephen

    Publié 2002
    Livre
  13. 13

    From a Buick 8 : a novel / par King, Stephen, 1947-

    Publié 2002
    Publisher description
    Livre
  14. 14
  15. 15
  16. 16

    The best American magazine writing.

    Publié 2013
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook
  17. 17

    Defending the brand aggressive strategies for protecting your brand in the online arena / par Murray, Brian H., 1968-

    Publié 2004
    Table des matières: “…-- What to do -- The business case -- Boardroom summary -- The opportunities and threats of online commentary -- The rumor mill -- Financial earnings -- Early warning -- Information security -- Other security and liability threats -- The world's largest focus group -- Activism and "sucks" sites -- Nobody is immune -- Managing risk -- Buried treasure -- The business case -- Boardroom summary -- Customer diversion -- Customer capture -- Cybersquatting -- Typo-piracy -- Domain name administration -- Arbitration -- Search engine manipulation -- Invisible seeding -- Visible seeding -- Spoofing --Paid placement -- Managing seeding and spoofing issues -- Software utility generated advertisements -- Mislabeled links -- Unsolicited e-mail -- Keeping the customer -- Bringing the customer back -- Scope of the problem -- The future -- The business case -- Boardroom summary -- Online partners and distribution issues -- A managing partner compliance -- The customer experience -- Changing dynamics -- Online partners -- Affiliates -- Suppliers -- Distributors -- Third parties -- Monitoring partners -- Step 1: Prioritization -- Step 2: Brand management -- Step 3: Enforcement -- The business case -- Boardroom summary -- Counterfeits and gray markets -- Gray markets -- Combating gray market activity -- Counterfeiting -- Copier supplies -- Pharmaceuticals -- Online monitoring -- Criteria that may signal a suspect distributor -- Testing authenticity -- The business case -- Boardroom summary -- Defending against digital piracy -- Music -- Sales leads -- Video -- Cease and desist -- Customer convenience -- Copy protection and digital rights management -- Software -- Text and images -- E-books -- The Stephen King experiment -- News services -- Market data -- The business case -- Boardroom summary -- Trust -- The costs of compromised privacy and security -- Information collection technologies -- Cookies -- Web beacons -- Information security -- Customer information transmission -- Customer information storage -- Fraud -- Managing privacy and security -- The business case -- Boardroom summary -- Competitive intelligence -- Using online competitive intelligence to outmaneuver competitor brands -- The internet as a competitive intelligence source -- Brand presence -- Brand reach -- Competitor brand abuse -- Competitor absence -- Linking relationships -- Partnerships -- Recruiting competitor partners -- Online commentary -- Collecting the data -- Counterintelligence -- Actionable information -- The business case -- Boardroom summary.…”
    An electronic book accessible through the World Wide Web; click to view
    Électronique eBook