Use crystals, twisted jump rings, and other sparkly elements to create 30 eye-catching necklaces, bracelets, and earrings. Sue Ripsch uses traditional chain mail weaves with a twist to create her pieces, and each project is fully illustrated with a lot of photographs and tips. This book offers the specific look of quality, lasting jewelry pieces that are wearable every day.
Most chain mail project books focus on long chains of traditional chain mail weaves. In Fabulous Chain Mail Jewelry: Creating with Components, noted designer and teacher Marilyn Gardiner offers a fresh, component-based approach to chain mail jewelry. Gardiner teaches readers to create short segments of chain — components — and then combine these units with bead links and metal connectors. Readers will also learn to build custom shapes, bails, beads, pendants, and tassels to incorporate into their creations. The 25+ projects in Gardiner's newest book use sterling silver, copper, and some colored rings, all in her signature “office jewelry" style — jewelry women will feel comfortable wearing in any setting. Gardiner also offers design variations for some projects, allowing readers the freedom to make each piece their own. The projects include familiar weaves, but the emphasis is on the beautiful jewelry readers can create with short segments of chain mail rather than long chains. The book includes clear, easy-to-follow instructions and plenty of photos that will appeal to beginning jewelry makers. Readers with intermediate or advanced chain mail skills will enjoy using their skills in a new, innovative way.
In this gorgeous book, Kat Wisniewski, a chain mail artist, teacher, and owner of Elemental Art Jewelry offers 25 unique projects, each using closed rings, glass and rubber with the chain mail to add color and texture. Jewelry makers can choose from a variety of bracelets, necklaces, earrings and pendants. All the projects are made using a new pattern (not the basic, traditional weaves). The jewelry is colorful, creative, and very wearable. Even advanced chain mailers will learn something new in this book: how to incorporate closed rings for beautiful results.
Following the success of Classic Chain Mail Jewelry from Kalmbach comes Creative Chain Mail Jewelry, featuring over 25 chain mail projects from Bead&Button and Art Jewelry magazines. These projects employ a broad assortment of jump rings, traditional techniques and other materials to achieve modern looks. Easy projects focus on opening and closing jump rings, stringing and crimping, while a more advanced project requires soldering. The book is organized from easy to challenging projects for progressive practice for beaders of all skill levels. Keeping jump rings front and center, the book shows how to make a huge variety of designs from classic to contemporary.
Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books. This book is designed to be the "one-stop shop" for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses. Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch. Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book's unique style will give the reader the value of 10 books in 1.