1.

Record Nr.

UNINA9910786978703321

Autore

Warwick Mal

Titolo

How to write successful fundraising appeals [[electronic resource] /] / Mal Warwick with Eric Overman

Pubbl/distr/stampa

San Francisco, CA, : Jossey-Bass, c2013

ISBN

1-118-57321-8

1-118-61808-4

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (384 p.)

Collana

The Jossey-Bass nonprofit guidebook series

Altri autori (Persone)

OvermanEric

Disciplina

658.15/224

Soggetti

Direct-mail fund raising

Nonprofit organizations - Finance

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Free Professional Content; How to Write Successful Fundraising Appeals; Copyright; Contents; Preface to the Third Edition; About the Author; Introduction: Why You Should Read This Book; From Fundraising Letter to Fundraising Package; Why You Can Learn from the Examples-Even Though Your Organization Is Different; Part One: Motivating Your Audience; 1: Why People Respond to Fundraising Appeals; People Send Money Because You Ask Them to; People Send Money Because They Have Money Available to Give Away; People Send Money Because They're in the Habit of Sending Money

People Send Money Because They Support Organizations Like Yours People Send Money Because Their Gifts Will Make a Difference; People Send Money Because Gifts Will Accomplish Something Right Now; People Send Money Because You Recognize Them for Their Gifts; People Send Money Because You Give Them Something Tangible in Return; People Send Money Because You Enable Them to ""Do Something"" about a Critical Problem, if Only to Protest or Take a Stand; People Send Money Because You Give Them a Chance to Associate with a Famous or Worthy Person

People Send Money Because You Allow Them to Get Back at the Corrupt or the Unjust People Send Money Because You Give Them the Opportunity to ""Belong""-as a Member, Friend, or Supporter-and Thus You Help Them Fight Loneliness; People Send Money Because You



Enable Them to Offer Their Opinions; People Send Money Because You Provide Them with Access to Inside Information; People Send Money Because You Help Them Learn about a Complex and Interesting Problem or Issue; People Send Money Because You Help Them Preserve Their Worldview by Validating Cherished Values and Beliefs

People Send Money Because You Allow Them to Gain Personal Connections with Other Individuals Who Are Passionately Involved in Some Meaningful Dimension of Life People Send Money Because You Give Them the Chance to Release Emotional Tension Caused by a Life-threatening Situation, a Critical Emergency, or an Ethical Dilemma; People Send Money Because They Are Afraid; People Send Money Because You Allow Them to Relieve Their Guilt about an Ethical, Political, or Personal Transgression, Whether Real or Imagined; People Send Money Because You Give Them Tax Benefits

People Send Money Because They Feel It's Their Duty People Send Money Because They Believe It's a Blessing to Do so; People Send Money Because They Want to ""Give Something Back""; People Send Money Because You Offer Them a Choice of Specific Programs or Projects; 2: How a Fundraising Appeal Is Like a Personal Visit; What Happens in a Personal Fundraising Visit?; How People Decide Whether to Open Fundraising Letters; How a Fundraising Letter Is Like a Face-to-Face Dialogue; Answering Your Reader's Questions Before They're Even Asked; The Four Waves of Rejection; Wave One; Wave Two; Wave Three

Wave Four

Sommario/riassunto

Includes Sample Letters, Real World Examples, Style Tips, New Chapters on E-mail, Websites, Social Media, and More...  Now in a completely revised third edition, this classic book shows how to create winning appeals that will realize the full potential of direct mail and online fundraising. Written by fundraising guru Mal Warwick, with assistance from Eric Overman, this comprehensive resource gives nonprofit fundraising staff the information needed to write compelling fundraising appeals for any medium. If you follow Warwick's guidelines, your direct mail and online fundraising campaig



2.

Record Nr.

UNINA9910483441103321

Titolo

Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers / / edited by Orr Dunkelman

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009

ISBN

1-282-33190-6

9786612331909

3-642-03317-2

Edizione

[1st ed. 2009.]

Descrizione fisica

1 online resource (425 p.)

Collana

Security and Cryptology, , 2946-1863 ; ; 5665

Classificazione

DAT 465f

SS 4800

Disciplina

005.82

Soggetti

Cryptography

Data encryption (Computer science)

Computer programming

Data structures (Computer science)

Information theory

Coding theory

Algorithms

Computer science - Mathematics

Cryptology

Programming Techniques

Data Structures and Information Theory

Coding and Information Theory

Mathematical Applications in Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited --



On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.

Sommario/riassunto

This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.