Search:

Create the perfect fit : measuring and pattern fitting for real sewing solutions / by Mahon, Joi.;
LSC
Subjects: Dressmaking.; Sewing.; Clothing and dress measurements.;
© c2014., Fons & Porter,
Available copies: 1 / Total copies: 1
unAPI

The savvy seamstress : an illustrated guide to customizing your favorite patterns / by Mallalieu, Nicole Claire,1968-author.;
Includes bibliographical references and index.
Subjects: Clothing and dress measurements.; Dressmaking;
Available copies: 1 / Total copies: 1
unAPI

We measure the earth with our bodies : a novel / by Lama, Tsering Yangzom,author.;
"A compelling and profound debut novel about a Tibetan family's journey through exile. In the wake of China's 1959 invasion of Tibet, Lhamo and her younger sister, Tenkyi, arrive at a refugee camp in Nepal. They survived the dangerous journey across the Himalayas, but their parents did not. As Lhamo--haunted by the loss of her homeland and her mother, a village oracle--tries to rebuild a life amid a shattered community, hope arrives in the form of a young man named Samphel, whose uncle brings with him an ancient statue of the Nameless Saint--a relic known to vanish and reappear in times of need. Decades later, the sisters are separated, and Tenkyi is living with Lhamo's daughter, Dolma, in Toronto. While Tenkyi works as a cleaner and struggles with traumatic memories, Dolma vies for a place as a scholar of Tibet Studies. But when Dolma comes across the Nameless Saint in a collector's vault, she must decide what she is willing to do for her community, even if it means risking her dreams. Breathtaking in its scope and powerful in its intimacy, We Measure the Earth with Our Bodies is a gorgeously written meditation on colonization, displacement, and the lengths we'll go to remain connected to our families and ancestral lands. Told through the lives of four people over fifty years, this novel provides a nuanced, moving portrait of the little-known world of Tibetan exiles"--
Subjects: Historical fiction.; Novels.; Exiles; Life change events; Refugees; Relics; Sisters; Tibetans; Women, Tibetan;
Available copies: 1 / Total copies: 1
unAPI

Knit wear love : foolproof instructions for knitting your best-fitting sweaters ever in the styles you love to wear / by Herzog, Amy.; Pearson, Karen,photographer.; Schaupeter, Karen.;
Includes bibliographical references.
Subjects: Clothing and dress measurements.; Knitting; Sweaters.;
Available copies: 2 / Total copies: 2
unAPI

You can knit that : foolproof instructions for fabulous sweaters / by Herzog, Amy,author.; Pearson, Karen,photographer.;
"When knitting superstar Amy Herzog gets complimented on her hand-knit sweaters, the compliments are often followed by “but I could never knit that.” Now, you can! You Can Knit That is a clear, simple reference book and pattern collection that gives knitters the sweater-making confidence they need. Whether you're knitting a sweater for the first time or seeking to expand your skills to knit sweaters in styles you've never tried before, this essential guide starts with basic sweater know-how and moves into instructions for knitting six must-have sweater styles--vests, all-in-one construction, drop shoulders, raglans, yokes, and set-in sleeves. Each chapter offers a less-intimidating “mini” sweater sized for a child and a selection of adult women's patterns in 12 sizes--24 sweater patterns in all, each building on the next, to ensure success with even the most complicated sweaters."--(Harry N. Abrams, Inc.).
Subjects: Knitting; Sweaters.; Clothing and dress measurements.;
Available copies: 0 / Total copies: 1
unAPI

Scuba diving safety / by Orr, Dan,1947-; Douglas, Eric,1967-;
Includes bibliographical references (p. 187), Internet addresses and index.
Subjects: Scuba diving; Scuba diving injuries;
© c2007., Human Kinetics,
Available copies: 1 / Total copies: 1
unAPI

Go your own way : hacks, tips and tricks to travel the world solo / by Groundwater, Ben,author.;
Subjects: Guidebooks.; Travel; Travel; Single people;
Available copies: 1 / Total copies: 1
unAPI

Riding to Craggy Rock / by Smith, Annette.; Wilson, Mark,1949-;
When Mitch and his family take a bike ride to Craggy Rock for a picnic, they learn how to be safe during a thunderstorm.LSC
Subjects: Thunderstorms; Lightning;
Available copies: 1 / Total copies: 1
unAPI

Not your gran's sewing book : easy alterations for the perfect fit at any size / by Luecke, Allie,author.;
It's finally here: The holy grail for creating clothes that celebrate your body and let all your curves and swerves sing! In this guide to easy alterations, flip-thrift guru Allie Luecke shares all the top tips to have your clothes fitting like a glove. Perfect for beginners, Allie's book has got you covered with easy-to-follow guides and fantastic projects including: starting strong (learn how to hem and dart everything you own ; take it all in (turn oversized into just-the-right size); let it all out (seam rip the shit out of too-tight clothes); mind the button gap (close the gaps on a button down shirt -- buh-bye, peeking bra!); zipper-ty doo dah (add zippers to form-fitting pieces -- or any piece, really). Whether you're tailoring the fit of a waistband or adding a pocket, Allie's clear tutorials guide you through the process with ease, and her signature voice and sense of humor will have you smiling while you sew. So don't give up on those unworn pieces haunting you from the closet; join Allie and let your clothes adorn your body the way they were destined to!
Subjects: Clothing and dress measurements.; Clothing and dress.; Sewing.; Tailoring.;
Available copies: 1 / Total copies: 1
unAPI

How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas,author.;
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis; Identify what information is in an email header; Review header information and extract key indicators or patterns used for detection; Identify signs of a suspicious or malicious email message; Detect the tactics that attackers use in phishing emails; Safely examine email links and attachments; Use a variety of free and simple tools to analyze email messages.
Subjects: Electronic mail messages; Phishing;
Available copies: 1 / Total copies: 1
unAPI