| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910786978703321 |
|
|
Autore |
Warwick Mal |
|
|
Titolo |
How to write successful fundraising appeals [[electronic resource] /] / Mal Warwick with Eric Overman |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
San Francisco, CA, : Jossey-Bass, c2013 |
|
|
|
|
|
|
|
ISBN |
|
1-118-57321-8 |
1-118-61808-4 |
|
|
|
|
|
|
|
|
Edizione |
[3rd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (384 p.) |
|
|
|
|
|
|
Collana |
|
The Jossey-Bass nonprofit guidebook series |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Direct-mail fund raising |
Nonprofit organizations - Finance |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Free Professional Content; How to Write Successful Fundraising Appeals; Copyright; Contents; Preface to the Third Edition; About the Author; Introduction: Why You Should Read This Book; From Fundraising Letter to Fundraising Package; Why You Can Learn from the Examples-Even Though Your Organization Is Different; Part One: Motivating Your Audience; 1: Why People Respond to Fundraising Appeals; People Send Money Because You Ask Them to; People Send Money Because They Have Money Available to Give Away; People Send Money Because They're in the Habit of Sending Money |
People Send Money Because They Support Organizations Like Yours People Send Money Because Their Gifts Will Make a Difference; People Send Money Because Gifts Will Accomplish Something Right Now; People Send Money Because You Recognize Them for Their Gifts; People Send Money Because You Give Them Something Tangible in Return; People Send Money Because You Enable Them to ""Do Something"" about a Critical Problem, if Only to Protest or Take a Stand; People Send Money Because You Give Them a Chance to Associate with a Famous or Worthy Person |
People Send Money Because You Allow Them to Get Back at the Corrupt or the Unjust People Send Money Because You Give Them the Opportunity to ""Belong""-as a Member, Friend, or Supporter-and Thus You Help Them Fight Loneliness; People Send Money Because You |
|
|
|
|
|
|
|
|
|
|
|
Enable Them to Offer Their Opinions; People Send Money Because You Provide Them with Access to Inside Information; People Send Money Because You Help Them Learn about a Complex and Interesting Problem or Issue; People Send Money Because You Help Them Preserve Their Worldview by Validating Cherished Values and Beliefs |
People Send Money Because You Allow Them to Gain Personal Connections with Other Individuals Who Are Passionately Involved in Some Meaningful Dimension of Life People Send Money Because You Give Them the Chance to Release Emotional Tension Caused by a Life-threatening Situation, a Critical Emergency, or an Ethical Dilemma; People Send Money Because They Are Afraid; People Send Money Because You Allow Them to Relieve Their Guilt about an Ethical, Political, or Personal Transgression, Whether Real or Imagined; People Send Money Because You Give Them Tax Benefits |
People Send Money Because They Feel It's Their Duty People Send Money Because They Believe It's a Blessing to Do so; People Send Money Because They Want to ""Give Something Back""; People Send Money Because You Offer Them a Choice of Specific Programs or Projects; 2: How a Fundraising Appeal Is Like a Personal Visit; What Happens in a Personal Fundraising Visit?; How People Decide Whether to Open Fundraising Letters; How a Fundraising Letter Is Like a Face-to-Face Dialogue; Answering Your Reader's Questions Before They're Even Asked; The Four Waves of Rejection; Wave One; Wave Two; Wave Three |
Wave Four |
|
|
|
|
|
|
Sommario/riassunto |
|
Includes Sample Letters, Real World Examples, Style Tips, New Chapters on E-mail, Websites, Social Media, and More... Now in a completely revised third edition, this classic book shows how to create winning appeals that will realize the full potential of direct mail and online fundraising. Written by fundraising guru Mal Warwick, with assistance from Eric Overman, this comprehensive resource gives nonprofit fundraising staff the information needed to write compelling fundraising appeals for any medium. If you follow Warwick's guidelines, your direct mail and online fundraising campaig |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910483441103321 |
|
|
Titolo |
Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers / / edited by Orr Dunkelman |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-282-33190-6 |
9786612331909 |
3-642-03317-2 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2009.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (425 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 5665 |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer programming |
Data structures (Computer science) |
Information theory |
Coding theory |
Algorithms |
Computer science - Mathematics |
Cryptology |
Programming Techniques |
Data Structures and Information Theory |
Coding and Information Theory |
Mathematical Applications in Computer Science |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited -- |
|
|
|
|
|
|
|
|
|
|
|
On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes. |
|
|
|
|
|
|
|
| |