1.

Record Nr.

UNINA9910792139303321

Autore

Ellis Desmond

Titolo

Marital separation and lethal domestic violence / / Desmond Ellis, Noreen Stuckless, Carrie Smith

Pubbl/distr/stampa

London ; ; New York : , : Routledge, , 2015

ISBN

1-317-52212-5

1-138-13974-2

1-315-72148-1

1-317-52213-3

Descrizione fisica

1 online resource (237 p.)

Altri autori (Persone)

SmithCarrie

StucklessNoreen

Disciplina

362.82/927

362.82927

Soggetti

Family violence - Prevention

Marital violence - Prevention

Marital conflict

Separation (Law) - Psychological aspects

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and indexes.

Nota di contenuto

Cover; Half Title; Title Page; Copyright Page; Table of Contents; List of Figures and Tables; Online Resources; Introduction; CHAPTER 1 Marital Separation: Definition and Process; Marital Separation; Definition; Process: "Untying the Knot"; Separation and Divorce; Definitions: Validity and Utility as Criteria; Attachment/Frustration-Aggression Theory; Protective and Aggravating Effects; Separating from Abusive Male Partners; Comment; Discussion Questions; CHAPTER 2 Lethal Domestic Violence: Definitions and Motives; Definitions; Homicide; Femicide; Femicide-Suicide

Are Femicide-Suicides Premeditated?Types of Domestic Violence; Comment; Discussion Questions; CHAPTER 3 Separation and Lethal Intimate Partner Violence; Sociological Empirical Generalizations; Sex/Gender and Lethal Domestic Violence; Marital Separation; Separation and Homicide-Femicide; Recency of Spousal Femicide and Homicide Following Separation; Separation, Divorce, and Spousal



Homicide/Suicide; Separation and Femicide-Suicide; Recency of Femicide-Suicide Following Separation; Separation and Suicide; Recency of Suicide Following Marital Separation

Recency of Femicide-Suicide Following SeparationSummary; Comment; Discussion Questions; CHAPTER 4 Theorizing Separation and Intimate Partner Homicide; Family as a Stateless Location; Homicide as Self-Defense; Male Batterers as Their Own Gravediggers; Theorizing Intimate Partner Homicide; Research; Summary; Comment; Discussion Questions; CHAPTER 5 Separation and Intimate Partner Femicide; Evolutionary Psychological Theory; The By-Product Hypothesis; Femicide Adaptation Theory; Patriarchy Theory; Conflict Resolution Theory; Dynamics of Conflict Resolution

A Domestic Context-Specific Theory of Conflict ResolutionSummary; Comment; Discussion Questions; CHAPTER 6 Separation and Intimate Partner Femicide-Suicide; Evolutionary Psychological Theory; Sociological Social Control Theory; Attribution Theory; Masculinity Theory; Personality Theory; Conflict Resolution Theory; Comment; Discussion Questions; CHAPTER 7 Separation and Suicide; Social Integration-Regulation Theory; Borderline Personality Theory; Conflict Resolution Theory; Summary; Comment; Discussion Questions; CHAPTER 8 Preventing Intimate Partner Homicide and Femicide

Community/Law Enforcement InterventionsShelters and Domestic Violence Abuse Courts; The Role of Public Policies and Programs in Preventing Femicide; Risk Assessment; Lethality Risk Assessment and Separation; Comment; Discussion Questions; References; Author Index; Subject Index

Sommario/riassunto

This book is the first to investigate the effects of participation in separation or divorce proceedings on femicide (murder of a female), femicide-suicide, homicide, and suicide. Because separation is one of the most significant predictors of domestic violence, this book is exclusively devoted to theorizing, researching, and preventing lethal domestic violence or other assaults triggered by marital separation. The authors provide evidence supporting the use of an estrangement-specific risk assessment and estrangement-focused public education to prevent murders and assaults. This information is



2.

Record Nr.

UNINA9910786978703321

Autore

Warwick Mal

Titolo

How to write successful fundraising appeals [[electronic resource] /] / Mal Warwick with Eric Overman

Pubbl/distr/stampa

San Francisco, CA, : Jossey-Bass, c2013

ISBN

1-118-57321-8

1-118-61808-4

Edizione

[3rd ed.]

Descrizione fisica

1 online resource (384 p.)

Collana

The Jossey-Bass nonprofit guidebook series

Altri autori (Persone)

OvermanEric

Disciplina

658.15/224

Soggetti

Direct-mail fund raising

Nonprofit organizations - Finance

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Free Professional Content; How to Write Successful Fundraising Appeals; Copyright; Contents; Preface to the Third Edition; About the Author; Introduction: Why You Should Read This Book; From Fundraising Letter to Fundraising Package; Why You Can Learn from the Examples-Even Though Your Organization Is Different; Part One: Motivating Your Audience; 1: Why People Respond to Fundraising Appeals; People Send Money Because You Ask Them to; People Send Money Because They Have Money Available to Give Away; People Send Money Because They're in the Habit of Sending Money

People Send Money Because They Support Organizations Like Yours People Send Money Because Their Gifts Will Make a Difference; People Send Money Because Gifts Will Accomplish Something Right Now; People Send Money Because You Recognize Them for Their Gifts; People Send Money Because You Give Them Something Tangible in Return; People Send Money Because You Enable Them to ""Do Something"" about a Critical Problem, if Only to Protest or Take a Stand; People Send Money Because You Give Them a Chance to Associate with a Famous or Worthy Person

People Send Money Because You Allow Them to Get Back at the Corrupt or the Unjust People Send Money Because You Give Them the Opportunity to ""Belong""-as a Member, Friend, or Supporter-and Thus You Help Them Fight Loneliness; People Send Money Because You



Enable Them to Offer Their Opinions; People Send Money Because You Provide Them with Access to Inside Information; People Send Money Because You Help Them Learn about a Complex and Interesting Problem or Issue; People Send Money Because You Help Them Preserve Their Worldview by Validating Cherished Values and Beliefs

People Send Money Because You Allow Them to Gain Personal Connections with Other Individuals Who Are Passionately Involved in Some Meaningful Dimension of Life People Send Money Because You Give Them the Chance to Release Emotional Tension Caused by a Life-threatening Situation, a Critical Emergency, or an Ethical Dilemma; People Send Money Because They Are Afraid; People Send Money Because You Allow Them to Relieve Their Guilt about an Ethical, Political, or Personal Transgression, Whether Real or Imagined; People Send Money Because You Give Them Tax Benefits

People Send Money Because They Feel It's Their Duty People Send Money Because They Believe It's a Blessing to Do so; People Send Money Because They Want to ""Give Something Back""; People Send Money Because You Offer Them a Choice of Specific Programs or Projects; 2: How a Fundraising Appeal Is Like a Personal Visit; What Happens in a Personal Fundraising Visit?; How People Decide Whether to Open Fundraising Letters; How a Fundraising Letter Is Like a Face-to-Face Dialogue; Answering Your Reader's Questions Before They're Even Asked; The Four Waves of Rejection; Wave One; Wave Two; Wave Three

Wave Four

Sommario/riassunto

Includes Sample Letters, Real World Examples, Style Tips, New Chapters on E-mail, Websites, Social Media, and More...  Now in a completely revised third edition, this classic book shows how to create winning appeals that will realize the full potential of direct mail and online fundraising. Written by fundraising guru Mal Warwick, with assistance from Eric Overman, this comprehensive resource gives nonprofit fundraising staff the information needed to write compelling fundraising appeals for any medium. If you follow Warwick's guidelines, your direct mail and online fundraising campaig



3.

Record Nr.

UNINA9910483441103321

Titolo

Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers / / edited by Orr Dunkelman

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009

ISBN

1-282-33190-6

9786612331909

3-642-03317-2

Edizione

[1st ed. 2009.]

Descrizione fisica

1 online resource (425 p.)

Collana

Security and Cryptology, , 2946-1863 ; ; 5665

Classificazione

DAT 465f

SS 4800

Disciplina

005.82

Soggetti

Cryptography

Data encryption (Computer science)

Computer programming

Data structures (Computer science)

Information theory

Coding theory

Algorithms

Computer science - Mathematics

Cryptology

Programming Techniques

Data Structures and Information Theory

Coding and Information Theory

Mathematical Applications in Computer Science

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Stream Ciphers -- Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium -- An Efficient State Recovery Attack on X-FCSR-256 -- Key Collisions of the RC4 Stream Cipher -- Invited Talk -- Intel’s New AES Instructions for Enhanced Performance and Security -- Theory of Hash Functions -- Blockcipher-Based Hashing Revisited --



On the Security of Tandem-DM -- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 -- Hash Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2 -- Cryptanalysis of the LAKE Hash Family -- Block Ciphers Analysis -- New Cryptanalysis of Block Ciphers with Low Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates -- Practical Collisions for EnRUPT -- The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl -- Block Ciphers -- Revisiting the IDEA Philosophy -- Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2) -- Beyond-Birthday-Bound Security Based on Tweakable Block Cipher -- Theory of Symmetric Key -- Enhanced Target Collision Resistant Hash Functions Revisited -- Message Authentication Codes -- MAC Reforgeability -- New Distinguishing Attack on MAC Using Secret-Prefix Method -- Fast and Secure CBC-Type MAC Algorithms -- HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.

Sommario/riassunto

This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Fast Software Encryption, FSE 2009 held in Leuven, Belgium in February 2009. The 24 revised full papers were carefully reviewed and selected from 76 submissions. The papers are organized in topical sections on stream ciphers, theory of hash functions, block ciphers analysis, block ciphers, theory of symmetric key, and message authentication codes.