Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Historia 250
- History 250
- Photography 243
- Digital techniques 192
- Social aspects 86
- Filosofía 76
- Política y gobierno 76
- Engineering & Applied Sciences 71
- History and criticism 70
- Social conditions 67
- Image processing 65
- RELIGION 64
- Computer networks 63
- Race relations 60
- Adobe Photoshop 59
- Management 58
- Novela norteamericana 55
- Crítica e interpretación 53
- African Americans 50
- Computer security 50
- Historia y crítica 50
- Novela inglesa 49
- Art, Architecture & Applied Arts 45
- Politics and government 45
- Visual Arts 45
- Security measures 44
- United States 43
- Aspectos sociales 41
- Computer graphics 40
- Computer Science 37
-
5841Publicado 2017Tabla de Contenidos: “…-- Installing Visual C++ -- Setting up -- Downloading the installation files -- Installing Visual Studio -- Registering with Microsoft -- Examining C++ projects -- Compilers -- Linking the code -- Source files -- A simple example -- Creating source files -- Compiling the code -- Passing parameters between the command-line and an executable -- The preprocessor and symbols -- Defining constants -- Using macros -- Using symbols -- Using pragmas -- Dependencies -- Libraries -- Pre-compiled headers -- Project structure -- Managing dependencies -- Makefiles -- Writing a simple project -- The project structure -- Creating the precompiled header -- Creating the main file -- Using input and output streams -- Using time functions -- Building the executable -- Testing the code -- Changing the project -- Summary -- Chapter 2: Understanding Language Features -- Writing C++ -- Using white space -- Formatting code -- Writing statements -- Working with expressions -- Using the comma operator -- Using types and variables -- Using constants and literals -- Defining constants -- Using constant expressions -- Using enumerations -- Declaring pointers -- Using namespaces -- C++ scoping of variables -- Using operators -- Exploring the built-in operators -- Arithmetic operators -- Increment and decrement operators -- Bitwise operators -- Boolean operators -- Bitwise shift operators -- Assignment operators -- Controlling execution flow -- Using conditional statements -- Selecting -- Looping -- Looping with iteration -- Conditional loops -- Jumping -- Using C++ language features -- Summary -- Chapter 3: Exploring C++ Types -- Exploring built-in types…”
Libro electrónico -
5842por Varma, SumatiTabla de Contenidos: “…Cover -- About the Author -- Brief Contents -- Contents -- Preface -- The Development of this Book -- Unit I: Foundations -- Chapter 1: Globalization and International Business -- Introduction -- Elements of Globalization -- Economic Globalization -- Cultural Globalization -- Political Globalization -- Drivers of Globalization -- Political Forces -- Economic Forces -- Technological Forces -- Industry Focus: Social Networking -- Emergence of Global Governance -- Competitive Forces -- Region Focus: Civets -- International Orientations -- Ethnocentric Orientation -- Polycentric Orientation -- International Business in Action: Multi-Latinas -- Regiocentric Orientation -- Geocentric Orientation -- International Versus Domestic Business -- Motives for Internationalization -- Two Decades of Shifting Wealth -- The Globalization Debate -- Arguments in Support of Globalization -- Concerns with Respect to Globalization -- Managerial Implications: Managing a Global Enterprise -- Terrorism -- Corruption -- Cultural Adjustment -- Closing Case: The Japanese Road to Success -- Summary -- Key Terms -- Discussion Questions -- Mini Projects -- Endnotes -- Chapter 2: Globalization of Business Structures: The Transnational Corporation -- Introduction -- Transnational Corporations -- TNCs from Developed and Developing Countries -- Non-Equity Modes of International Production -- Transnationality of Firms -- Changing Face of TNCs -- Evolution of TNCs -- Dragon TNCs -- Born Globals -- Industry Focus: Accelerated Internationalization of the White Goods Sector -- Global Niche Players -- Micro TNCs -- State-owned TNCs -- International Business in Action: Changing Face of the Family Business in the Middle East -- Theories of Firm Internationalization -- Closing Case: Globalization of the Brazilian Enterprise -- Summary -- Key Terms -- Discussion Questions -- Mini Projects…”
Publicado 2012
Libro electrónico -
5843por Saha, A.Tabla de Contenidos: “…Cover -- Contents -- Foreword -- Preface -- Part A: Information Theory and Source Coding -- Chapter 1: Probability, Random Processes, and Noise -- 1.1 Introduction -- 1.2 Fundamentals of Probability -- 1.2.1 Algebra of Probability -- 1.2.2 Axioms of Probability -- 1.2.3 Elementary Theorems on Probability -- 1.2.4 Conditional Probability -- 1.2.5 Independent Events -- 1.2.6 Total Probability -- 1.3 Random Variables and Its Characteristics -- 1.3.1 Discrete Random Variable and Probability Mass Function -- 1.3.2 Cumulative Distribution Function -- 1.3.3 Distribution Function for Discrete Random Variable -- 1.3.4 Continuous Random Variable and Probability Density Function -- 1.4 Statistical Averages -- 1.5 Frequently Used Probability Distributions -- 1.5.1 Binomial Distribution -- 1.5.2 Poisson Distribution -- 1.5.3 Gaussian Distribution -- 1.6 Random Processes -- 1.7 Noise -- 1.7.1 Sources of Noise -- 1.7.2 Thermal Noise -- 1.7.3 Shot Noise -- 1.7.4 Partition Noise -- 1.7.5 Flicker Noise or 1/f Noise -- 1.8 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 2: Information Theory -- 2.1 Introduction -- 2.2 Measure of Information -- 2.3 Entropy -- 2.4 Information Rate -- 2.5 Channel Model -- 2.5.1 Discrete Memoryless Channel -- 2.5.2 Special Channels -- 2.6 Joint Entropy and Conditional Entropy -- 2.7 Mutual Information -- 2.8 Channel Capacity -- 2.8.1 Special Channels -- 2.9 Shannon's Theorem -- 2.10 Continuous Channel -- 2.10.1 Differential Entropy -- 2.10.2 Additive White Gaussian Noise Channel -- 2.10.3 Shannon-Hartley Law -- 2.11 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 3: Source Codes -- 3.1 Introduction -- 3.2 Coding Parameters -- 3.3 Source Coding Theorem -- 3.4 Classification of Codes -- 3.5 Kraft Inequality -- 3.6 Image Compression…”
Publicado 2013
Libro electrónico -
5844Publicado 2011Tabla de Contenidos: “…Common Problems with Presentations -- The Central Tenets of Presentations -- Point Counterpoint -- Qualities of an Effective Presenter -- Presentation Strategies -- Purpose -- Audience -- Context -- Technique -- Preparation and Delivery -- Collecting Information -- Organizing Information -- Communication Bytes 9.1 -- Structure of a Presentation -- Opening, Closing, and Sustaining the Presentation -- The Opening -- Communication Bytes 9.2 -- The Middle -- The Ending -- Getting Ready to Deliver a Presentation -- Delivery Outline -- Stage Fright and Speech Anxiety -- How to Deal with Stage Fright Successfully -- Information Bytes 9.1 -- An Ideal Presenter -- Body Language and Presentations -- Visual Cues -- Vocal and Verbal Enhancements in a Presentation -- Handling Questions -- Preparing Visual Aids -- Summary -- Assess Your Knowledge -- Use Your Knowledge -- Web-based Exercises -- Further Reading -- Endnotes -- Chapter 10: Introduction to Business Writing -- Introduction -- Poor Writing and Liability -- Information Bytes 10.1 -- Technology and Writing -- Academic Writing and Business Writing -- Point Counterpoint -- Roadblocks to Writing on the Job -- Educational Barriers -- Professional Barriers -- Grammar -- Punctuation: Background -- Commas (,) -- Semicolons [ -- ] -- Inverted Commas ('/' and ''/") -- En Dashes and Em Dashes (- and -) -- Developing Words, Sentences, and Paragraphs -- Use Concrete Words -- Use Jargon with Care -- Use Active Verbs -- Use I and We Correctly -- Avoid Discriminatory Language -- Developing Sentences -- Sentences: The Long and Short of it -- Direct and Indirect Statements -- Positive and Negative Expressions -- Organizing Paragraphs -- Communication Bytes 10.1 -- Messages -- Sender-centric and Receiver-centric Messages -- Information Patterns -- Document Layout -- Headings and Sub-headings -- Chunking -- White Space…”
Libro electrónico -
5845por Multidisciplinary Digital Publishing InstituteTabla de Contenidos: “…Eng. 2016, 4(4), 65; doi: 10.3390/jmse4040065 http://www.mdpi.com/2077-1312/4/4/65 .126 -- Christopher Small, Tyler Blanpied, Alicia Kauffman, Conor O'Neil, Nicholas Proulx, Mathew Rajacich, Hailey Simpson, Jeffrey White, Malcolm L. Spaulding, Christopher D.P. Baxter and J. …”
Publicado 2017
Libro electrónico -
5846por Tsuji, KoichiTabla de Contenidos: “…Adding app users to your apps and defining editing permissions -- Adding new users as normal users -- Adding new users as a co-author -- Defining the app role for each user -- Controlling permission levels with expressions -- Using the userrole() expression to control permissions -- Using the useremail() expression to control permissions -- Passing an expression to the table permission control -- Controlling what data is sent to a user's device and security options -- Creating a new security filter per table -- Implementing additional security measures for safety -- Summary -- Chapter 7: Managing the App Environment -- Analyzing app features and transferring the app ownership -- The Plan requirements tab -- Transferring the app ownership -- Setting editor settings, copying, and deleting apps -- Performing app version management -- The version history of an app -- Upgrading the app version for all users -- Creating a stable version of an app -- Deploying an app with all features -- Checking an app's deployment readiness -- White labeling an app -- Additional options under the Deploy tab -- Monitoring app usage and app sync performance -- Knowing the user's app usage pattern -- Using Audit History for the row-level user activity -- Analyzing an app's sync performance -- Sending on-demand messages to app users -- Summary -- Part 3 - Advanced Features and External Services -- Chapter 8: Automating Recurring Data Changes and Scheduling Tasks -- What is AppSheet Automation? …”
Publicado 2023
Libro electrónico -
5847Publicado 2017Tabla de Contenidos: “…9.4.6.3 Prohibited Sharks Formerly in the Pelagic Sharks Group -- 9.4.7 Rays and Skates -- 9.5 Summary -- References -- Chapter 10: Commercial and Recreational Fisheries of the Gulf of Mexico -- 10.1 Introduction -- 10.2 The Management Process at Its Base -- 10.2.1 Federal Oversight: National Oceanic and Atmospheric Administration -- 10.2.2 State Agency Management -- 10.2.3 Gulf States Marine Fisheries Commission -- 10.3 Gulf of Mexico Commercial Fisheries in Aggregate -- 10.3.1 Gulf of Mexico Landings -- 10.3.1.1 Menhaden Landings -- 10.3.1.2 Brown Shrimp Landings -- 10.3.1.3 White Shrimp Landings -- 10.3.1.4 Blue Crab Landings -- 10.3.1.5 Oyster Landings -- 10.3.1.6 Landings of All Other Species -- 10.3.2 Aggregate Landings by State -- 10.3.3 Catch by Distance from Shore -- 10.3.4 Dockside Value of Landings -- 10.3.5 Processing Plants and Related Employment -- 10.3.6 Economic Impact of Gulf of Mexico Commercial Fishing -- 10.3.6.1 Sales Impacts -- 10.3.6.2 Income Impacts -- 10.3.6.3 Employment Impacts -- 10.3.6.4 Value Added -- 10.3.6.5 Imports and Sales, Income, Employment, and Value Added Impacts -- 10.3.7 Commercial Fisheries of State Managed Species -- 10.3.7.1 The Blue Crab Fishery -- 10.3.7.2 The Menhaden Fishery -- 10.3.7.3 Other State-Managed Species -- 10.3.8 Additional Detail on Key Commercial Species -- 10.3.8.1 The Shrimp Fishery -- 10.3.8.1.1 Gulf Shrimp Landings and the Relation to Imports -- 10.3.8.1.2 A Closer Look at Imports -- 10.3.8.1.3 A Closer Look at the Gulf Shrimp Fishery -- Shrimp Effort -- Shrimp Size at Harvest -- Harvested Species -- Harvest by Depth and Movement of the Fleet -- Variability in Shrimp Populations and Harvests -- Catch per Unit Effort -- Financial Condition of the Fleet -- 10.3.8.1.4 The Gulf of Mexico Shrimp Processing Sector…”
Libro electrónico -
5848
-
5849
-
5850
-
5851
-
5852
-
5853Publicado 2022Tabla de Contenidos: “…-- Agile DevOps teams - organizing principles design -- Step 1 - defining the core capabilities and actors -- Step 2 - capturing the detailed business enterprise agility model -- Step 3 - capturing the detailed regulatory/compliance context -- Step 4 - capturing the current Agile DevOps teams' topologies -- Step 5 - getting the notation and templates defined -- Step 6 - setting the approach and principles of the design -- Step 7 - conducting the actual design -- Step 8 - evaluating based on predefined criteria -- Step 9 - feasibility study and compliance foundation -- Step 10 - defining the basis for a job description -- Step 11 - defining the DevOps WoW white paper -- Summary -- Part 3: Capability Engineering, Enablement, and Launch -- Chapter 6: DevOps Software Development Life Cycle 360° Evolution and Engineering -- Defining the DevOps SDLC -- What is DevOps SDLC 360° evolution and engineering? …”
Libro electrónico -
5854por Orzach, YoramTabla de Contenidos: “…Encryption basics and protocols -- Services provided by encryption -- Stream versus block ciphers -- Symmetric versus asymmetric encryption -- Public key infrastructure and certificate authorities -- Authentication basics and protocols -- Authentication types -- Username/password with IP address identification authentication -- Encrypted username/password authentication -- Extensible authentication protocol (EAP) -- Authorization and access protocols -- Hash functions and message digests -- IPSec and key management protocols -- VPNs -- IPSec principles of operation -- IPSec tunnel establishment -- IPSec modes of operation -- IPSec authentication and encryption protocols -- IPSec AH protocol -- IPSec ESP protocol -- SSL/TLS and proxies -- Protocol basics -- The handshake protocol -- Network security components - RADIUS/TACACS+, FWs, IDS/IPSs, NAC, and WAFs -- Firewalls -- RADIUS, NAC, and other authentication features -- Web application firewalls (WAFs) -- Summary -- Questions -- Chapter 4: Using Network Security Tools, Scripts, and Code -- Commercial, open source, and Linux-based tools -- Open source tools -- Commercial tools -- Information gathering and packet analysis tools -- Basic network scanners -- Network analysis and management tools -- Protocol discovery tools -- Vulnerability analysis tools -- Nikto -- Legion -- Exploitation tools -- The Metasploit Framework (MSF) -- Stress testing tools -- Windows tools -- Kali Linux tools -- Network forensics tools -- Wireshark and packet capture tools -- Summary -- Questions -- Chapter 5: Finding Protocol Vulnerabilities -- Black box, white box, and gray box testing -- Black box and fuzzing -- Enterprise networks testing -- Provider networks testing -- Fuzzing phases -- Common vulnerabilities -- Layer 2-based vulnerabilities -- Layer 3-based vulnerabilities -- Layer 4-based vulnerabilities…”
Publicado 2022
Libro electrónico -
5855Publicado 2023Tabla de Contenidos: “…-- JavaScript is a huge topic -- How this book is different -- Learn JavaScript as it's used -- Understand similarities between the most popular libraries -- Adapt to new technologies -- Conventions Used in This Book -- Foolish Assumptions -- Icons Used in This Book -- Beyond the Book -- Where to Go from Here -- Book 1 JavaScript Fundamentals -- Chapter 1 Jumping into JavaScript -- JavaScript, the Basics -- JavaScript is a programming language -- A look at programming language levels -- Machine code is processor-specific -- High-level languages are abstractions -- Compilation makes programs portable -- A short and epic history of JavaScript -- The two superpowers -- The early battles -- Eich is back with a brand-new invention -- Imitation is the sincerest form of flattery -- The long road to standardization -- How JavaScript changes -- Reading and Copying JavaScript Code -- How the web works -- Front end and back end -- The front end is open, the back end is closed -- The value of a service -- JavaScript on the server -- Starting Your Development Environment -- Installing Visual Studio Code -- Learning to use Visual Studio Code -- Creating a new project -- Learning the one essential command -- Writing Your First JavaScript Program -- JavaScript is made of statements -- JavaScript is case-sensitive -- JavaScript ignores white space -- JavaScript programmers use camelCase and underscores -- camelCase -- Underscore -- Dashes -- Running Code in the Console -- Rerunning Commands in the Console -- Running Code in a Browser Window -- Running JavaScript from HTML event attributes -- Running HTML inside script elements -- Including JavaScript files in your HTML -- Chapter 2 Filling Your JavaScript Toolbox -- Installing Node.js -- Configuring Visual Studio Code…”
Libro electrónico -
5856por Lam, JamesTabla de Contenidos: “…Price Transparency -- A Look to the Future -- Lessons Learned from Enron -- Keep Your Eye on the Cash -- Manage All of Your Risks -- Get Auditors Back to Basics -- Lessons Learned from the BP Oil Spill -- Chapter 18 Non-Financial Corporations -- Risk Management Requirements -- Credit Risks -- Market Risks and Hedging -- Stock Price Risk -- Investment Risks -- Hedging Risks -- Secondary Risks -- Operational and Insurable Risks -- Catastrophic Failures -- Business Risk -- Cultural Risks -- Pension Risks -- Outsourcing -- Reputational Risks -- Best Practices in Corporate Risk Management -- Risk Identification and Assessment -- Quantification and Reporting -- Management And Control -- Case Study: Microsoft -- Case Study: Ford -- Case Study: Airbus and Boeing -- Section Four A Look to the Future -- Chapter 19 Predictions -- The Profession of Risk Management -- A Career In Risk Management -- Education and Evangelism -- Technology and the Convergence of Risk Management -- Ten Predictions -- 2013 Looking Back -- Chapter 20 Everlast Financial -- Section Five ERM Implementation -- Chapter 21 ERM Implementation -- Benefits of Corporate Governance and ERM Practices -- McKinsey & -- Company (2002) -- Brown and Caylor (2004), Cheng and Wu (2005) -- Hoyt and Liebenberg (2009) -- Standard & -- Poor's (2010) -- ERM Implementation Requirements -- Definitions of Risk and ERM -- Governance Structure and Policies -- Risk Assessment and Quantification -- Risk Management -- Reporting and Monitoring -- ERM Maturity Model -- Stage 1: Definition and Planning (White Belt) -- Stage 2: Early Development (Yellow Belt) -- Stage 3: Standard Practice (Green Belt) -- Stage 4: Business Integration (Brown Belt) -- Stage 5: Business Optimization (Black Belt) -- Other ERM Maturity Models -- Risk Culture -- Chapter 22 Role of the Board -- Board Oversight Requirements…”
Publicado 2014
Electrónico -
5857Publicado 2019Tabla de Contenidos: “…4.2 Primary Drivers, 4.2.1 Internal and External Drivers, 4.3 Secondary Drivers, 4.4 Practical Issues with Drivers, 4.4.1 Sub-Classification of Primary Drivers, 4.4.2 Avoid Pseudo-Drivers, 4.4.3 Things are rarely Black or White, 4.5 Accuracy and Precision of Primary and Secondary Drivers, 4.5.1 Accuracy, Precision and Drivers - A Pareto Perspective, 4.5.2 Cone of Uncertainty, 4.6 3-Point Estimates as a Measure of Relative Accuracy and Uncertainty, 4.7 Precision as an Expression of Appropriate or Inappropriate Exactness, 4.8 Chapter Review, References, 5 Factors, Rates, Ratios, and Estimating by Analogy, 5.1 Estimating Metrics, 5.1.1 Where to use them, 5.1.2 The Views of Others, 5.1.3 Underlying Linear Relationship, 5.2 Rates, 5.3 Factors, 5.4 Ratios, 5.5 Dealing with Multiple Rates, Factors (and Ratios), 5.5.1 Anomalous Analogies, 5.5.2 Analogies with an Additive Model, 5.5.3 Analogies with a Multiplicative Model, 5.6 Sensitivity Analysis on Factors, Rates and Ratios, 5.6.1 Choosing a Sensitivity Range Quantitatively, 5.6.2 Choosing a Sensitivity Range around a Measure of Central Tendency, 5.6.3 The Triangulation Option, 5.6.4 Choosing a Sensitivity Range around a High-end or Low-end Metric, 5.6.5 Choosing a Sensitivity Range when all else fails, 5.7 Chapter Review, References, 6 Data Normalisation - Levelling the Playing Field, 6.1 Classification of Data Sources - Primary, Secondary and Tertiary Data, 6.1.1 Primary Data, 6.1.2 Secondary Data, 6.1.3 Tertiary Data, 6.1.4 Quarantined Data, 6.2 Types of Normalisation Methods and Techniques, 6.3 Normalisation can be a Multi-Dimensional Problem, 6.3.1 Error Related, 6.3.2 Volume, Quantity or Throughput Related - Economies of Scale, 6.3.3 Scale Conversion - Fixed and Variable Factors, 6.3.4 Date or Time Related, 6.3.5 Life Cycle Related, 6.3.6 Key Groupings - Role Related, 6.3.7 Scope Related (Subjective), 6.3.8 Complexity - Judgement Related (Subjective), 6.4 The Estimator as a Time Traveller, 6.4.1 Use of Time-based Indices Now and Then, 6.4.2 Time-based Weighted Indices, 6.4.3 Time-based Chain-Linked Weighted Indices, 6.4.4 The Doubling Rule for Escalation, 6.4.5 Composite Index: Is that not just a Weighted Index by another Name? …”
Libro electrónico -
5858por Lindsell-Roberts, SherylTabla de Contenidos: “…. -- Don't get it right - get it written -- Sequencing for Maximum Impact -- Polishing the Draft -- Chapter 7 Designing Visuals to Enhance the Reader's Experience -- Using AI as Your Assistant for Dynamic Visuals -- Generating Precise Prompts -- Peeking Into the World of Infographics -- Adding Tables and Charts -- Table that thought -- Chart your course -- Coloring Your Way to Clarity -- Digging into Visuals Beyond Graphics -- Including white space -- Limiting paragraph and sentence length -- Preparing strong headlines that tell a story -- Putting it on the list -- Using bulleted lists -- Using numbered lists…”
Publicado 2024
Libro electrónico -
5859por Vanhove, SanderTabla de Contenidos: “…-- Type hinting variables -- Type hinting arrays -- Learning about the Variant type -- Type hinting function parameters -- Type hinting function returns -- Using void as a function return -- Inferred types -- null can be any type -- Autocompletion -- Using type hinting for named classes -- Performance -- Editor adding type hints -- OOP primer -- Inheritance -- Abstraction -- Encapsulation -- Polymorphism -- Additional exercises - Sharpening the axe -- Summary -- Quiz time -- Chapter 5: How and Why to Keep Your Code Clean -- Technical requirements -- Back to naming things -- Naming conventions -- General naming tips -- Public and private class members -- Make short functions -- DRY -- Do one thing (KISS) -- Defensive programming -- Programming style guides -- White spacing -- Blank lines -- Line length -- Utilizing the documentation -- Accessing a class's documentation -- Directly accessing a function or variable's documentation -- Going to the definition of a function or variable -- Searching the documentation -- Accessing the online documentation -- Summary -- Quiz time -- Part 2: Making a Game in Godot Engine…”
Publicado 2024
Libro electrónico -
5860Publicado 2011Tabla de Contenidos: “….; House of Arts and Culture / JSa - Javier Sánchez ; Kristiansund Opera and Culture House / Terry Pawson Architects ; Centre Eurorégional des cultures urbaines et extension de la Maison Folie de Moulins / L'atelier d'architecture King Kong ; Green Hole / AIA ; School Rendu Floirac / Sylviane Ferron & Eric Monnereau ; Fallingwater cabin design competition / Olson Kundig Architects; Centro escolar de Vagos / José Castro Silva ; Flesberg Kommune Skole / Ola Roald AS Arkitektur ; Minakata Kumagusu Institute / Teruo Miyahara Architect Office ; Stockholm City Library Extension / Jonathan Woolf ; Biblioteca pública del estado en Barcelona / AIA ; Biblioteca José Vasconcelos / Pascal Arquitectos ; Hafnafjördur Public Library extensión and refurbishment / Studio Granada ; Astana National Library / BIG - Bjarke Ingels Group ; Neubau Fachhochschule Düsseldorf / Bob Gysin + Partner BGP Architekten ETH SIA BSA ; India National Centre for Antarctic and Ocean Research / Ferraro Choi and Associates ; Zentrum für Molekulare Biowissenschaften / DI Ernst Giselbrecht + Partner ZT GmbH ; UTS Faculty of engineering and IT building (COLAB) / Suters Architects ; Ars Electronica Center / Caramel architekten ZT GMBH ; Solar pavilion and environs (TETRAS) / Roger F. White Studio ; Historical exposition pavilion, "Przelomy" Centre of Dialog / KWK promes ; Hatlehol Kyrkje (church) / Cornelius + Vöge ; Iglesia de la Natividad / Pascal Arquitectos ; Järva Friedhof (cemetery) / Topotek 1 ; Vestfold Krematorie / Eriksen Skajaa Arkitekter…”
Libro