Kerry Cox: 4 books

Book cover of How to Write Faster Than Anyone Better, and Better Than Anyone Faster

How to Write Faster Than Anyone Better, and Better Than Anyone Faster

A Practical Guide to More Profitable Word Production

by Kerry Cox
Language: English
Release Date: March 1, 2013

Writing for a living is a business. In business, time is money. As a writer, if you’re able to increase your hourly output without sacrificing quality, you’re increasing your potential income. How to Writer Faster Than Anyone Better, and Better Than Anyone Faster by Kerry Cox is a practical, immediately...
Book cover of Successful Scriptwriting

Successful Scriptwriting

How to write and pitch winning scripts for movies, sitcoms, soaps, serials and variety shows

by Jurgen Wolff, Kerry Cox
Language: English
Release Date: May 30, 2011

SUCCESSFUL SCRIPTWRITING Let's start with "The End." The credits roll - we see "Screenplay by …" and there's your name. The show's a hit! It's Emmy/Oscar night, and you're seated up front. The nominations are revealed; your name is called. Your acceptance speech is memorable,...
Book cover of Working with Parents of Young People

Working with Parents of Young People

Research, Policy and Practice

by Amanda Holt, Cris Hoskin, Helen Richardon Foster
Language: English
Release Date: October 20, 2006

This book provides practical guidance for a wide range of professionals working with parents and families, answering common questions such as 'How can parents facilitate their child's transition to secondary school?' and 'How can families best communicate about alcohol?'. Drawing on the findings from...
Book cover of Managing Security with Snort & IDS Tools

Managing Security with Snort & IDS Tools

Intrusion Detection with Open Source Tools

by Kerry J. Cox, Christopher Gerg
Language: English
Release Date: August 2, 2004

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts,...
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy