- Table View
- List View
Crucial Conversations: Tools for Talking When Stakes are High
by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler and Emily GregoryThe book that revolutionized business communications has been updated for today’s workplace. Crucial Conversations provides powerful skills to ensure every conversation—especially difficult ones—leads to the results you want. Written in an engaging and witty style, the book teaches readers how to be persuasive rather than abrasive, how to get back to productive dialogue when others blow up or clam up, and it offers powerful skills for mastering high-stakes conversations, regardless of the topic or person. <P><P>Whether they take place at work or at home, with your coworkers or your spouse, crucial conversations have a profound impact on your career, your happiness, and your future. With the skills you learn in this book, you'll never have to worry about the outcome of a crucial conversation again.
Crucial Conversations: Tools for Talking When Stakes are High
by Kerry Patterson Joseph Grenny Ron Mcmillan Al SwitzlerThe New York Times and Washington Post bestseller that changed the way millions communicate "[Crucial Conversations] draws our attention to those defining moments that literally shape our lives, our relationships, and our world. . . . This book deserves to take its place as one of the key thought leadership contributions of our time. " --from the Foreword by Stephen R. Covey, author of The 7 Habits of Highly Effective People "The quality of your life comes out of the quality of your dialogues and conversations. Here's how to instantly uplift your crucial conversations. " --Mark Victor Hansen, cocreator of the #1 New York Times bestselling series Chicken Soup for the Soul#65533; The first edition of Crucial Conversations exploded onto the scene and revolutionized the way millions of people communicate when stakes are high. This new edition gives you the tools to: Prepare for high-stakes situations Transform anger and hurt feelings into powerful dialogue Make it safe to talk about almost anything Be persuasive, not abrasive
Crucial Conversations: Tools for Talking When Stakes Are High
by Kerry Patterson Joseph Grenny Ron Mcmillan Al Switzler Stephen R. CoveyFour cofounders of a corporate consulting firm present their formula for effective communication, based on the trial and error of years spent as corporate trainers. The reader is drilled not only in communication skills but also to recognize bad or shifty modes of communication, to develop integrity in word and deed, and to achieve more effective work habits. Annotation c. Book News, Inc., Portland, OR (booknews.com)
The Cruel Radiance: Photography and Political Violence
by Susie LinfieldIn The Cruel Radiance, Susie Linfield challenges the idea that photographs of political violence exploit their subjects and pander to the voyeuristic tendencies of their viewers. Instead she argues passionately that looking at such images—and learning to see the people in them—is an ethically and politically necessary act that connects us to our modern history of violence and probes the human capacity for cruelty. Grappling with critics from Walter Benjamin and Bertolt Brecht to Susan Sontag and the postmoderns—and analyzing photographs from such events as the Holocaust, China’s Cultural Revolution, and recent terrorist acts—Linfield explores the complex connection between photojournalism and the rise of human rights ideals. In the book’s concluding section, she examines the indispensable work of Robert Capa, James Nachtwey, and Gilles Peress and asks how photography should respond to the increasingly nihilistic trajectory of modern warfare.A bracing and unsettling book, The Cruel Radiance convincingly demonstrates that if we hope to alleviate political violence, we must first truly understand it—and to do that, we must begin to look.
Crusading Iowa Journalist Verne Marshall: Exposing Graft and the 1936 Pulitzer Prize
by Jerry HarringtonOn December 12, 1934, police raided a canning factory in Cedar Rapids, uncovering an illegal liquor and gambling set-up. Verne Marshall, tempestuous editor of the Cedar Rapids Gazette, sensed a bigger story and a wider network of corruption. His aggressive investigative reporting led to multiple resignations, nearly fifty indictments and the dramatic trial of the state’s attorney general. These explosive exposés earned Verne Marshall and the paper the 1936 Pulitzer Prize. Author Jerry Harrington traces the legacy of Marshall’s incendiary crusade across Iowa’s political landscape.
The Crushing of Poland: Rare Photographs from Wartime Archives (Images of War)
by Ian Baxter"Hitlers decision to invade Poland in August 1939 triggered the start of the Second World War. It was also the first demonstration of Blitzkrieg tactics the ruthless use of armor, mobile infantry and air support. The brave Polish army, inadequately equipped and inferior in numbers, was overwhelmed by this awesome display of military power as well as being taken by surprise. Official German photographers accompanied the triumphant Nazi forces on their victorious advance which first seized the key part of Danzig and then Warsaw, all within one month. The Crushing of Poland captures the drama and raw aggression of the Campaign in photographs and full captions."
Crypto and AI: From Coevolution to Quantum Revolution
by Behrouz Zolfaghari Hamid Nemati Naoto Yanai Khodakhast BibakThis book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Crypto-Politics: Encryption and Democratic Practices in the Digital Era (Routledge New Security Studies)
by Linda MonseesThis book examines current debates about the politics of technology and the future of democratic practices in the digital era. The volume centres on the debates on digital encryption in Germany and the USA, during the aftermath of Edward Snowden’s leaks, which revolved around the value of privacy and the legitimacy of surveillance practices. Using a discourse analysis of mass media and specialist debates, it shows how these are closely interlinked with technological controversies and how, as a result, contestation emerges not within one public sphere but within multiple expert circles. The book develops the notion of ‘publicness’ in order to grasp the political significance of these controversies, thereby making an innovative contribution to Critical Security Studies by introducing digital encryption as an important site for understanding the broader debates on cyber security and surveillance. This book will be of much interest to students of critical security studies, science and technology studies, and International Relations.
Cryptographic Engineering
by Cetin Kaya KocThis book is for engineers and researchers working in the embedded hardware industry. This book addresses the design aspects of cryptographic hardware and embedded software. The authors provide tutorial-type material for professional engineers and computer information specialists.
Cryptography: A Very Short Introduction
by Fred Piper Sean MurphyProvide information about cryptography, gives tips and techniques.
Cryptography (Springer Undergraduate Mathematics Ser.)
by Simon Rubinstein-SalzedoThis text introduces cryptography, from its earliest roots to cryptosystems used today for secure online communication.Beginning with classical ciphers and their cryptanalysis, this book proceeds to focus on modern public key cryptosystems such as Diffie-Hellman, ElGamal, RSA, and elliptic curve cryptography with an analysis of vulnerabilities of these systems and underlying mathematical issues such as factorization algorithms. Specialized topics such as zero knowledge proofs, cryptographic voting, coding theory, and new research are covered in the final section of this book.Aimed at undergraduate students, this book contains a large selection of problems, ranging from straightforward to difficult, and can be used as a textbook for classes as well as self-study. Requiring only a solid grounding in basic mathematics, this book will also appeal to advanced high school students and amateur mathematicians interested in this fascinating and topical subject.
Cryptography and Coding: 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings (Lecture Notes in Computer Science #9496)
by Jens GrothThis book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience.
Cryptography and Information Security in the Balkans: Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science #9540)
by Enes Pasalic Lars R. KnudsenThis book contains revised selected papers fromthe Second International Conference on Cryptology and Information Security inthe Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented inthis volume were carefully reviewed and selected from 27 submissions. They areorganized in topical sections named: symmetric key cryptography; cryptanalysis;security and protocols; and implementation and verifiable encryption.
Cryptography and Secure Communication
by Richard E. BlahutToday's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block and stream cyphers through to systems based on elliptic and hyperelliptic curves, accompanied by concise summaries of the necessary mathematical background. Practical aspects such as implementation, authentication and protocol-sharing are also covered, as are the possible pitfalls surrounding various cryptographic methods. Written specifically with engineers in mind, and providing a solid grounding in the relevant algorithms, protocols and techniques, this insightful introduction to the foundations of modern cryptography is ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.
Cryptography in Constant Parallel Time (Information Security and Cryptography)
by Benny ApplebaumLocally computable (NC0) functions are "simple" functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth. This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way functions, pseudorandom generators, encryption schemes and digital signatures. It also extends these results to other stronger notions of locality, and addresses a wide variety of fundamental questions about local cryptography. The author's related thesis was honorably mentioned (runner-up) for the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments. The book assumes only a minimal background in computational complexity and cryptography and is therefore suitable for graduate students or researchers in related areas who are interested in parallel cryptography. It also introduces general techniques and tools which are likely to interest experts in the area.
A Cryptography Primer
by Philip N. KleinCryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2023 (Lecture Notes in Networks and Systems #918)
by Atul Chaturvedi Sartaj Ul Hasan Bimal Kumar Roy Boaz TsabanThe book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27–29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Cryptology and Network Security with Machine Learning: Proceedings of ICCNSML 2022 (Algorithms for Intelligent Systems)
by Bimal Kumar Roy Atul Chaturvedi Boaz Tsaban Sartaj Ul HasanThe book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 – 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Crystallizing Public Opinion
by Edward BernaysFamed as "the father of public relations," Edward Bernays pioneered the technique of working to change attitudes rather than just selling products. In this 1923 classic, the first book ever written about the public relations industry, he delineates the approaches that corporations and governments have taken for the past century to influence social tendencies.Crystallizing Public Opinion identifies the techniques employed by public relations professionals, from authoritative-sounding surveys to persuasive endorsements from opinion leaders, celebrities, and experts. Bernays — whose high-profile clients included Procter & Gamble, General Electric, CBS, NBC, and Time, Inc. — cites examples from his successful campaigns, including a physician-endorsed promotion of bacon as a healthy breakfast option. He quotes leading theorists on the role of herd mentality in the minds of the educated as well as the ignorant, and he explains the value of communicating the right facts at the right time to a targeted audience. Although technology has changed in the years since this book's debut, human nature has not, and these principles remain of timeless value to business and marketing professionals, students of public relations, and other readers.
Crystallizing Public Opinion
by Edward L. BernaysA revolutionary work on public relations and marketing by the provocative thinker who was dubbed the father of public relations Few books have been as quietly powerful as Edward L. Bernays's Crystallizing Public Opinion. First published in 1923, it is a groundbreaking and, as history has shown, influential guide to the most crucial principles of mass persuasion. Aimed at governments and corporations in the wake of World War I, this classic work combines crowd psychology with the pillars of psychoanalysis to argue the importance of public relations in democratic society. Citing far-reaching case studies from the resuscitation of a beleaguered magazine in New York to Lithuania's campaign for global recognition, Bernays illustrates the burgeoning significance of his field in shaping public opinion while also laying out the crucial techniques for mobilizing broad-based support in an increasingly fragmented world. Celebrated by PBS in its Books That Shook the World feature, Crystallizing Public Opinion occupies a fascinating place in history, defining both a concept and a system that were taken up by progressive social movements, corporate barons, and national governments alike.
CSR Communication in the Media: Media Management on Sustainability at a Global Level (CSR, Sustainability, Ethics & Governance)
by Franzisca Weder Lars Rademacher René SchmidpeterCorporate social responsibility (CSR) is an established management focus of today's companies and organizations of different types, scope and size. Communication practices on CSR and sustainability in the media industry, related theoretical concepts, and empirical foundations have not yet been sufficiently explored. This book focuses on a new normative framework of sustainability, bridging the established debate on public value with the current debate on social impact and the social license to operate in the media industry. With a variety of contributions from theory and practice, the book addresses the dual nature of media and media companies, which simultaneously produce economic and cultural goods and thus bear a "double responsibility": on the one hand, for the way they present reality, monitor and criticize economic and political developments, and bring ethical concerns to the public debate. On the other hand, they bear responsibility for their own activities as companies (license to operate). The book is therefore aimed at readers interested in the journalistic perspective and at executives in the media industry.
CSR und Interne Kommunikation: Forschungsansätze und Praxisbeiträge (Management-Reihe Corporate Social Responsibility)
by Riccardo Wagner Nicole Roschker Alexander MoutchnikDieses Buch zeigt wie Vorstand, Gesch#65533;ftsf#65533;hrung und CSR-Beauftragte die interne CSR-Kommunikation verbessern k#65533;nnen. Die eigenen Mitarbeiter tragen entscheidend dazu bei, dass Unternehmensverantwortung und Nachhaltigkeit in Unternehmen und Organisationen gelebt werden. Konkrete Unternehmensbeispiele und aktuelle Forschungsans#65533;tze veranschaulichen wie F#65533;hrungskr#65533;fte und Belegschaft eingebunden, aktiviert und zu CSR-Botschaftern im eigenen Unternehmen gemacht werden k#65533;nnen. Eine lohnenswerte Lekt#65533;re f#65533;r CSR-Verantwortliche, Kommunikationsprofis und -berater ebenso wie Forscher, die sich dem inter- und intradisziplin#65533;ren Thema ,,Interne CSR-Kommunikation" widmen.
CSR und Kommunikation: Unternehmerische Verantwortung überzeugend vermitteln (Management-Reihe Corporate Social Responsibility)
by Peter HeinrichCorporate Social Responsiblity gewinnt zunehmend an Bedeutung. Viele Unternehmen engagieren sich heute gesellschaftlich und übernehmen Verantwortung. Ein sinnvoller Schritt, denn so leisten sie einen Beitrag zur gesamtwirtschaftlichen Nachhaltigkeit, prägen ihr Image und generieren dabei gezielt Wettbewerbsvorteile. Ein wichtiger Schlüssel zum Erfolg liegt dabei in der Kommunikation. Sie muss fundiert, professionell gesteuert und langfristig angelegt sein, um die Engagements intern zu kommunizieren und auch das öffentliche Bewusstsein für dieses Thema zu schärfen. ,,Tue Gutes und sprich darüber" - es geht um einen Dialog mit allen relevanten Stakeholdern. Dieses Buch liefert einen fundierten, praxisbezogenen Überblick über die Kommunikationsinstrumente und -möglichkeiten sowie den Planungsprozess. Es ist ein Ideenkatalog und vermittelt zugleich auch das wissenschaftliche Hintergrundwissen. Experten aus verschiedenen Branchen zeigen, wie die CSR-Kommunikation wirksam angewendet wird. Letztendlich soll es den Menschen, die sich mit CSR beschäftigen - ob auf Unternehmens- oder Beraterseite, ob als Newcomer oder Experte - Orientierung, Impulse und Handlungsempfehlungen für die tägliche Praxis geben.
CSR und Kommunikation: Unternehmerische Verantwortung Uberzeugend Vermitteln (Management-Reihe Corporate Social Responsibility)
by Peter HeinrichDiese aktualisierte und überarbeitete 2. Auflage liefert einen fundierten, praxisbezogenen Überblick über die Kommunikationsinstrumente und -möglichkeiten sowie den Planungsprozess im Bereich CSR. Es ist ein Ideenkatalog und vermittelt zugleich auch das wissenschaftliche Hintergrundwissen. 20 Praxisbeiträge aus verschiedenen Branchen zeigen, wie die CSR-Kommunikation wirksam angewendet wird. Viele Unternehmen engagieren sich heute gesellschaftlich und übernehmen Verantwortung. Ein sinnvoller Schritt, denn so leisten sie einen Beitrag zur gesamtwirtschaftlichen Nachhaltigkeit, prägen ihr Image und generieren dabei gezielt Wettbewerbsvorteile. Ein wichtiger Schlüssel zum Erfolg liegt dabei in der Kommunikation. „Tue Gutes und sprich darüber“ – es geht um die Kommunikation mit allen relevanten Dialoggruppen. In diesem Zusammenhang gibt dieses Buch den Menschen, die sich mit CSR beschäftigen – ob auf Unternehmens- oder Beraterseite, ob als Newcomer oder als Experte – Orientierung, Impulse und Handlungsempfehlungen für die tägliche Praxis.
CSR und Reporting: Nachhaltigkeits- und CSR-Berichterstattung verstehen und erfolgreich umsetzen (Management-Reihe Corporate Social Responsibility)
by Matthias S. FifkaNachhaltigkeits- bzw. CSR-Reporting wird zunehmend zu einem Standard für Großunternehmen. 94% der 250 größten Unternehmen der Welt legen bereits einen Bericht zu den entsprechenden Aktivitäten vor. Dabei erfolgt zunehmend eine Orientierung an den Vorgaben der Global Reporting Initiative, die sich mehr und mehr als internationale Leitlinie durchsetzt. Obschon sich also eine gewisse Standardisierung hinsichtlich der Inhalte durchsetzt, gibt es noch immer große Unterschiede hinsichtlich der zur Verfügung gestellten Information. Dies gilt besonders im internationalen Vergleich. Dieses Buch gibt Ihnen einen Einblick in die bestehenden Unterschiede und zeigt wie CSR- und Nachhaltigkeitsberichterstattung erfolgreich implementiert werden kann. Dabei wird insbesondere auf die Chancen und Risiken zur Verfügung stehender Medien eingegangen.