The Royal Casino like Las Vegas has its share of characters and action; daily scenarios that keep Johnny Franco, General Manager, eagle-eyed. But 'Six Pack' Mike's major concern when he enters daily is the expeditious manner in which the cocktail waitresses deliver his first Budweisers, and whether he will still be conscious when the other twelve arrive. TEN TO CALL are words every poker player has heard when a dealer wakes him from his procrastination. It is the call to action that unfolds the daily humorous incidents, sex, drugs, and fast lane life style that characterize the world of casino poker. TEN TO CALL also depicts the tragic world of gambling addicts like Mike Sung Byong whose propensity to 'play cards' rather than poker sees him losing all...wife, family, business...labeled by other Asian action players as an easy mark. It is a world of glamour spiced with meltdowns and oddballs that makes 'Ten To Call' illuminating and entertaining.
Bob Hayes, PhD presents best practices in measurement and analytics for customer experience management (CEM) programs. Total Customer Experience (TCE) is the marriage of customer experience management data and different business data with appropriate analytics. This holistic view of the customers' attitudes about and interactions with a company provides a complete picture of the customer. This comprehensive view helps businesses gain insights into the causes and consequences of customer satisfaction and loyalty to help them improve the customer experience and increase customer loyalty. Drawing on decades of research and practice, Hayes illustrates analytical best practices in the field of customer experience management that will help you increase the value of all your business data.
Developing a Comprehensive Security Program answers the question common among security managers, "What is a model security program, and how does our program compare to it?" In this seven-minute Proven Practices presentation, narrator Elizabeth Lancaster outlines the baseline elements of a security program, which have been defined by experienced Security Executive Council members and research. This presentation is not sector-specific--meaning it's applicable for all organizations and industries. In addition to the baseline security program elements, Lancaster also discusses business-aligned program elements, program characteristics, a program maturity model, and the skills and knowledge the security department needs to possess. Developing a Comprehensive Security Program may be used as a benchmark for existing programs and to educate senior management. It also provides a general understanding of the security function as it currently exists. Developing a Comprehensive Security Program is a part of Elsevier's Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. The seven-minute, visual PowerPoint presentation with audio narration format is excellent for group learning Information is drawn from the many years of collective knowledge and experience of the Security Executive Council community Identifies program characteristics and the knowledge areas and skills security leaders should possess
Nine Practices of the Successful Security Leader lays out a series of best practices for security managers. Collected from interviews with security leaders at public and private sector organizations, ranging from small- and mid-size all the way up to large international entities, these practices are a sampling of what is vital and what works. Recommendations such as close communication with management, alignment of security agendas with business goals, and creating internal awareness programs are just some of the effective initiatives detailed in the report. With this information, security professionals can gain insight into the practices of their peers, measure their own success, and mentor junior colleagues. Nine Practices of the Successful Security Leader is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Based on extensive interviews performed by the Security Executive Council with today’s top security leaders Summarizes the insights taken from these interviews into nine practical ideas Provides actionable advice and strategies for earning the respect and trust of senior management and colleagues
The Yukon wolf is the largest race of Canis lupus in the world. There are 5,000 wolves in the territory. Wolves live in all Yukon mountain ranges hunting Dall's sheep and caribou in the high alpine. In the forested valleys they hunt moose, the ideal prey size for packs to handle. Regional wolf numbers depend on the number of moose in the area. Packs are territorial except in the far north where wolves migrate long distances to follow the Porcupine caribou herd year-round. --From book cover.
The Business Continuity playbook provides the background and tools to create, manage, and execute all facets of an organization’s business continuity program (BCP). Business continuity planning is an activity performed daily by organizations of all types and sizes to ensure that critical business functions are available before, during, and after a crisis. This playbook guides the security leader through the development, implementation, and maintenance of a successful BCP. The text begins with a detailed description of the concept and value of business continuity planning, transitioning into a step-by-step guide to building or enhancing a BCP. Its 14 appendices, which include sample forms, templates, and definitions, make it an invaluable resource for business continuity planning. The Business Continuity playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Answers the unavoidable question, "What is the business value of a business continuity program?" Breaks down a business continuity program into four major elements for better understanding and easier implementation Includes 14 appendices that provide sample forms, templates, and definitions for immediate adaptation in any business setting
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases. BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program. Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Presents research data associated with BYOD and productivity in the workplace Describes BYOD challenges, risks, and liabilities Makes recommendations for the components a clearly communicated BYOD program should contain
Fourteen thousand years ago, after a series of tragedies that decimates their people, three children find themselves alone on the Arctic tundra with no hope of survival. Kazan is a boy on the verge of becoming a hunter. Naali is a girl with special powers who can dream-travel and see the future. Barik, living in his sister's shadow, wrestles with a secret demon. In their quest to survive, they find Zhoh, a wolf pup, and their fate will hinge upon her. Together they must struggle to unite in the face of dangerous beasts, growing jealousy and distrust. To survive, Kazan and Naali must make a choice and confront a betrayal along with the wrath of One-Eye, the brutal bushman who has enslaved Kazan's family.
The International Security Programs Benchmark Report presents and analyzes the findings of a broad survey conducted by the Security Executive Council of corporate international security programs. The report identifies the types of international security baseline programs in place for a range of company sizes, and describes the organizational perception of security’s role and capability. The data suggest that international security programs are greatly affected by the company size and the location of the security department within the organization, whether as part of the executive, legal, or human resources function.Security leaders can gain valuable insights from this report regarding the scope of international security programs at key corporations with contextualized comparison points for evaluating their own programs.The International Security Programs Benchmark Report is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Summarizes the key points of a broad survey on international security programs conducted by the Security Executive Council Breaks down survey responses by company size and functional location of security within the organization Provides insight into other organizations’ existing international security programs and services
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media. The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy. Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation Cites examples of companies that have experienced this kind of threat and describes the successes or failures of their responses Describes practical, strategic methods for mitigating and resolving a crisis
Workplace Security Playbook: The New Manager’s Guide to Security Risk is a set of comprehensive risk management guidelines for companies that have other business functions coordinating security. When an employee without a security background is charged with the protection of people, facilities, or assets, the Workplace Security Playbook can be his or her go-to resource for security procedures and recommendations. Business risks are not static: They change and grow as a company changes and grows. New technology, increasing business competition, and social and cultural developments all contribute to new security risks and trends. With this in mind, the Workplace Security Playbook focuses on performance guidelines, rather than prescriptive standards. Using performance guidelines helps assess the individual, changing business and security needs that a manager may face. The easily implementable recommendations included in this book are categorized by issues. In addition to security performance guidelines, topics include the elements of a facility security program, how to conduct security surveys and validation testing, steps for performing workplace investigations and inspections, and procedures for emergency and special security situations. An entire chapter is dedicated to describing the resources available to a new security manager, and another provides an outline for building a customized reference source of local security information. The Workplace Security Playbook is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Chapters are categorized by issues for easy reference, and include the fundamentals of a security program up to high-level procedures Guidelines are specifically designed for companies that have other business functions coordinating security Emphasizes performance guidelines (rather than standards) that describe the basic levels of performance that will strengthen business operations while accommodating what resources are currently available
The humble man from Throckmorton, Texas, often called "the greatest defensive tackle in NFL history," shares his life's journey for the first time in "A Cowboy's Life." Bob Lilly recounts his beginnings in Texas, being the first player ever drafted by the Dallas Cowboys in 1961, his induction into the Ring of Honor and the Pro Football Hall of Fame, as well as his passion for photography.
This research report presents the findings of a broad survey of corporate security programs conducted by the Security Executive Council’s Security Leadership Research Institute (SLRI). The researchers' objective was to benchmark the state of the security industry in terms of organizational structure, budget, staff resources, board-level risk concerns, program drivers, and services provided. The level of responsibility each respondent reported for a list of 30 security programs or services is also compared across several organizational categories. This report can be used by security professionals for introspective analysis of the security team within their organizations, external review of the ways in which other organizations approach risk management, internal justification of security budgets and initiatives, and for performance metrics. Corporate Security Organizational Structure, Cost of Services and Staffing Benchmark is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs. Summarizes the key findings of a large survey on security programs conducted by the Security Executive Council’s Security Leadership Research Institute (SLRI) Breaks down survey responses by organization size, scope of responsibility, industry, and more in easy-to-read charts and tables Provides invaluable insight into other organizations’ existing security programs and services
Enter the northern Yukon, 14,000 years ago, the world of Zhoh: The Spirit of the Wolf. You don't have to tax your imagination. The author Hayes, a biologist and keen observer, recreates the era and the landscape for you. Bison, mammoths, ravens, lion, wolves (zhoh), short-faced bears...and, of course, humans populate this stunningly harsh environment. Conflicts and connections become real as both animals and humans search for survival, food, shelter, safety and family. This historical fiction recreates in realistic detail this world, where the thread of life is often short and slender and gives readers vital insights into a fascinating period into the continuum of life. -- Joyce Sward, longtime teacher, lover of stories, and organizer for 30 years of annual Yukon Writers' Festival and Yukon Young Authors' Conference. The Spirit of the Wolf is Book Two in the Zhoh series. It is the epic story of prehistoric survival at the end of the Ice Age as the great herds of steppe horses, bison, and mammoths are disappearing. In Book One, Zhoh: The Clan of the Wolf, Kazan and Naali lose their families to a series of disasters and must survive a brutal winter alone on the tundra-steppe. With the help of Zhoh, their semi-tame wolf, Naali's remarkable dream-travel powers, and Kazan's growing skills as a hunter, they defeat Barik, Naali's treacherous brother, and One-Eye, a murdurous bushman. In Book Two, Zhoh: The Spirit of the Wolf, Naali and Kazan are reunited with Kazan's mother, Assan, and his sister, So'tsal. Now Wolf Band, with the help of Zhoh, must continue their quest to find other humans or perish. As Naali becomes a woman, her growing spirit powers threaten to destroy her and put the band's survival at risk. Wolf Band must defeat a gigantic short-faced bear and face One-Eye and the Skin Stealers, a band of dangerous men who have murdered Naali's relatives and kidnapped Jidii, her young cousin. In pursuit of the Skin Stealers is Naali's uncle, Kural, a young hunter who has no hope of freeing Jidii alone. Woven through this human saga is the story of Grey-Eye, Zhoh's wolf mother, and her pack, who play a key role in Wolf Band's struggles.
IN AN ERA WHEN BLACK FAMILIES WERE STRUGGLING TO SURVIVE ECONOMICALLYAND OVERCOME HARSH RACIAL BARRIERS, THE HAWKINS AND EDWARDS CLANS WERE WITNESSING THEIR OWN IDENTITY CRISIS...'COLORED, ' 'NEGRO, ' 'BLACK'? BUT ALVINA EDWARDS' PERSONAL DILEMMA WAS MORE DRAMATIC. SHROUDED WITH A SELF-IMPOSED RELIGIOUS PIOUSNESS UNDER SIEGE, SHE NEEDED NOT ONLY HER BIBLE, BUT GUILE TO WARD OFF HER DETRACTOR. AND WITH A WILY GRANDSON, JASON EQUALLY DETERMINE TO DISCLOSE HER PAST, SHE MUST PREVAIL, EVEN AT THE EXPENSE OF FAMILY UNITY AND PROGRESS.
A coaching legend shares techniques, philosophies, and team-building exercises applicable beyond the playing field In 1979, when Bob Ladouceur took over the head football coaching job at De La Salle high school, the program had never once had a winning season. By the time he stepped down in 2013 and after posting an unprecedented 399–25–3 record, De La Salle was regarded as one of the great dynasties in the history of high school football. In When the Game Stands Tall: Coaches' Playbook, Ladouceur shares, for the first time, the coaching philosophies he employed at De La Salle. Far more than a book on the Xs and Os of football, this resource focuses on how Ladouceur created a culture based on accountability, work ethic, humility, and commitment that made his teams greater than the sum of their parts. This book not only include details on the nuances of the game and the techniques that made the Spartans the most celebrated high school football team in history, it also has chapters on creating what Ladouceur calls an "authentic team experience," which include lessons as valuable in a board room as in a locker room.
Most people want partners in their personal lives, and many businesses start with some form of partnership structure. Yet so many personal and professional partnerships disintegrate, sometimes quickly. That’s one reason why our own partnership seems so amazing, even miraculous, to people who know us. “How do you do it?” they constantly ask. “How have you spent so many years living and working together 24/7 without killing each other?” A general business/how-we-did-it-book, Smart Partners outlines the methods and thinking we’ve used to achieve financial success while also keeping our personal partnership alive and interesting. Drawing on our unique experiences both personally and professionally, we present principles for building, sustaining, and growing not merely serviceable relationships in business and life, but true partnerships. Partnerships are a big deal—not just specific partnerships, but the very idea of partnership. That’s why, from the very inception of a relationship, partners should proceed slowly, cautiously, thoughtfully, going “all in,” and doing whatever they can to keep the relationship vibrant and healthy. They should honor their relationship at every turn, and with all their strength. No matter what business you’re in you can transcend your sense of “me” to create a very powerful “we.” It’s a matter of concentrating on partnership, committing to it, and embracing the right practices—such as choosing your partner well, negotiating proper roles, planning for your mutual success, and adjusting so as to overcome challenges as they arise. Fundamentally, it’s about looking beyond yourself so as to share business and life with another person. None of this is easy, of course, but it’s so worth it. Read our stories, learn our partnership principles, and apply them to your life. We think you’ll discover what we have long known: We is better than me. And the truth is, anyone can be a smart partner.
MEXICO-A NATION'S CULTURE OF DENIAL" CHRONICLES MEXICO'S HISTORY AND ITS DEVELOPMENT OF A CUSTOM OF LOOKING OUTWARD TO LAY BLAME FOR INTERNAL ILLS. BEGINNING WITH ITS COLONIAL ERA WHEN SPAIN IMPOSED ITS SOCIAL YARDSTICK TO CONTROL MEXICO'S MAJORITY POPULATION OF MESTIZOS, INDIANS AND BLACKS, BOB HAYES ILLUSTRATES HOW THIS EARLY CATERIZATION OF ITS AFRICAN SLAVES; CATERGORIZING THEM AS OTHER THAN AFRICANS, PLAYED A MAJOR ROLE IN THE DEVELOPMENT OF THIS CULTURE OF DENIAL. BY TRACING ITS LONG, STRAINED RELATIONSHIP WITH A MORE POWERFUL AND AMBITIOUS U.S, THE AUTHOR DOCUMENTS HOW MEXICO STROVE TO RID ITSELF OF U.S. DOMINANCE BY BLANKETING ITSELF UNDER A SMOTHERING CLOAK OF NATIONALISM, MEXICO'S POWERFUL WERE ABLE TO CONVINCE ITS PEOPLE THAT IT WAS NECESSARY FOR 'THE WORLD TO UNDERSTAND MEXICO, NOT FOR MEXICO TO UNDERSTAND THE WORLD.' AND BY USING THEIR OWN REEINFORCING QUOTES, HAYES IS ABLE TO SUBSTANTUATE THIS MOST DISTURBING NUANCE.
Business growth depends on more than asking a single question. Challenging the widely touted Net Promoter Score (NPS) claims, author Bob E. Hayes provides compelling evidence that, to grow their business, companies need to look beyond this simple question to efforts on improving the entire customer feedback program (CFP). First, customer loyalty consists of three components, advocacy, purchasing, and retention, each providing unique and useful information regarding future business growth. By measuring these three components of customer loyalty, companies will be better able to manage their customer relationships to maximize growth through new and existing customers. Second, because of the diverse business practices companies can employ with respect to their CFPs, there are hundreds of different ways a company can structure its particular program. Some companies have top executive support for their programs while others do not. Some companies integrate their customer feedback data into their daily business processes while others keep them separate. Some companies use customer feedback results as part of their employee incentive programs while other companies rely on more traditional incentive programs. Still some companies conduct in-depth customer research using their feedback data while others rely on basic reporting of their customer feedback data for their customer insight. But are there critical elements of a customer feedback program that are absolutely necessary for its success? Can a company exclude some elements from its program without adversely impacting its effectiveness? How important are certain components in increasing customer loyalty? This book answers these questions. It is a direct result of the author’s scientific research and professional experience in the field of customer satisfaction and loyalty. This book represents the first scientific study that has tried to identify the best practices of customer feedback programs. Hayes formally collected information from many CFP professionals regarding how they structure their CFPs, and identified specific CFP practices that lead to higher levels of customer loyalty. Additionally, he worked first-hand with employees from Microsoft, Oracle, Harris Stratex Networks, Akamai, and American Express Business Travel in gathering insights and case studies to illustrate how to build a world class CFP. Learn why companies should look beyond the NPS as the ultimate question and learn how to design an effective CFP that will help improve the customer experience, increase customer loyalty, and, ultimately, drive business growth. For those unfamiliar with CFPs, the appendices provide detail on methods used in the main body of the book: a discussion on methods of determining customer requirements (those elements of your business that are important to your customers), a complete discussion on how to write survey questions, and brief discussions on particular statistical analysis methods that can help you understand how customer feedback data are analyzed.
In 1976, a U.S. SR-71 reconnaissance aircraft disappers during an illegal flight over Outer Mongolia. Neither the Mongolians, Chinese, Japanese, nor Soviets are initially able to connect the dots of intrigue. But the one surviving airman knows he must somehow elude KGB killers if he expects to stay alive. A chess game of deadly Cold War plots ensues; threatening to unmask international schemes designed to reorder Asia's balance of power
WHAT LORRAINE THOMAS VOWED AT 14 THAT STARING OUT SOME WINDOW MONTHLY, ANTICIPATING A MAILMAN'S DELIVERY OF A WELFARE CHECK, WOULD NOT DEFINE HER FUTURE. ALREADY THE MEN WERE OGLING, WAITING FOR HER TO RAISE HER SKIRT. SHE DID HAVE A MIRROR IN HER MOTHER'S MODEST LOS ANGELES BUNGALOW, BUT SHE DIDN'T NEED IT TO REMIND HER OF HER EXCEPTIONAL PHYSICAL ATTRIBUTES... QUALITIES SHE WAS CONVINCED WOULD FACILITATE HER ESCAPE FROM POVERTY AND ENSURE A QUALITY LIFE STYLE. AS GOD WAS HER WITNESS, SHE WOULD HAVE FINANCIAL SECURITY. AND IF SHE MUST USE HER BODY TO CARVE OUT A LIFE SHE FELT SHE DESERVED AND WAS WORTHY OF, THEN SO WOULD BE IT. HER GOAL WOULD NOT BE DETERRED, AND MEN WILLING AND ABLE TO AFFORD, WOULD BE WELCOME TO COME ALONG ON WHAT SHE PROMISED WOULD BE AN EVENTFUL BUT EXPENSIVE JOURNEY
AS HE ADVENTURES IN AND OUT OF AMOROUS RELATIONSHIPS. A YOUNG JUAN CARLOS SEEKS TO EXPLORE AND HEED EXACTLY WHAT HIS EXOTIC. DISCERNING MOTHER HAS PREACHED REGARDING WOMEN. SEX, AND LOVE. "VIOLET" BARES A YOUNG TEMPTRESS ON A MISSION TO ECLIPSE A DARK PAST: ELEVATING BEYOND THE GRASP OF CURIOSITY. AND IF IT MEANS UNLEASHING HER SEXUAL PROWESS. THEN SO BE IT. IN "DUMBAR HOTEL." A SUAVE, HANDSOME, GIGOLO, BILLY DUPREE. HAS LEFT HIS MARK ON LOS ANGELES' WOMEN OF MEANS. NOW ALL THAT REMAINS IS THE SEDUCTION OF ONE OF THE CITY'S LEADING DEBUTANTES WHOSE SOCIAL STATUS LABELS HIM FORBIDDEN FRUIT.
A BLACK WRITER OFFERS PRESIDENT BARACK OBAMA SOME SATIRICAL INSIGHTS INTO THE REALITY OF BEING THE 1 ST BLACK PRESIDENT IN A NATION THAT HAS YET TO COMPLETELY DIVORCE ITSELF FROM A RACIST PAST. HIS OPEN LETTER HIGHLIGHTS OBAMA ́S CRITICS... WORDS OF CAUTION THE WRITER SENSES THE PRESIDENT MIGHT NOT HAVE HAD FIRST-HAND LIFE EXPERIENCES TO REFLECT ON. WHAT HE WANTS IS FOR OBAMA TO SUCCEED; NOT ALLOW CONSERVATIVE ELEMENTS TO DETRACT HIM FROM FACING THE NATION ́S IMPOSING CHALLENGES.
JASON RICHARDS' DREAMS OF MAKING IT TO THE BIG LEAGUES HAVE ALL BUT EVAPORATED AFTER A DIVORCE AND FINDING HIMSELF STARING OUT OF BUS WINDOWS --- BUSES HEADED FOR ANOTHER DIMLY -LIT STADIUM IN THE MEXICAN LEAGUE. WHAT HE'S HOPING FOR IS A MIRACLE YEAR THAT WILL LAND HIM A SLOT IN THE HIGH MINOR LEAGUES BACK IN THE U.S. BUT ONCE THE DARK-HUED JAROCHA BEAUTY WRAPS HIM IN HER ARMS AND HER WEALTHY FATHER WELCOMES HIM INTO THE FAMILY, RICHARDS COMES FACE TO FACE WITH MEXICAN HOSPITALITY. HIS SISTER IS KIDNAPPED WHILE VACATIONING IN ACAPULCO, AND WHEN HER RESCUE OCCURS, DEADLY ZETA KILLERS WANT REVENGE...A TURN OF EVENTS THAT NOT ONLY DEFINE RICHARDS' FUTURE BUT THE LIVES OF OTHERS SUDDENLY CAUGHT UP IN A WEB OF EXTORTION AND ROMANCE THAT WEAVES FROM MEXICO TO CALIFORNIA, CREATING DRAMATIC LIFE TWISTS IN ITS WAKE.
Continue to follow the journey of Franklin Delano Roosevelt Gentry (Frankie) through joys, trials, and heartaches as he comes of age in a Southwest Virginia coal camp during the 1950's in the sequel to Canary in a Coal Mine. Frankie's friends, family, and occasional adversaries all come together to help him navigate the twists and turns of growing up in the uneasy times of coal mine closings, miner strikes, and new opportunities. His story will surely resonate not only with those who populated coal mining communities but others who experienced life in rural America. Bob L. Hayes grew up in the coal-rich Appalachian Mountains of Virginia and attended the schools included in this novel. He later worked for the FBI during the reign of J. Edgar Hoover and served as the chief financial officer for two colleges in North Carolina. He completed this novel just weeks before his death in 2011 at the age of 70.
Here you will find a collection of stories from the fevered minds of Source Point Press creators! Join Garret Gunn, Kasey Pierce, Bob Salley, David C. Hayes and Greg Wright in a collection of bizarre tales of bizarre beings! The ground-breaking anthology series from Source Point Press makes its triumphant return in 2018!
From the 16th Century, African slavers discharged their cargo in Mexico's port of Veracruz. But even today, Mexico is in a state of denial re: the existence and contrbution of its black population. "The Love Of A Prince" depicts this era, highlighting one Yanga, an escaped slave who fought against Spanish soldiers for more than 30 years before securing the FIRST black/Indian liberation in the Western Hemisphere. His fictional descendents tell Mexico's black history through their eyes...their struggle against the nation's rigid racism...their romantic exploits... achievements...their dedication to ensuring their history not be expunged.
* How can we understand and theorise school leadership? * How can school leadership work towards enhancing student learning? * What are the constraints and possibilities for school leadership at the beginning of a new century? This title is relevant to anyone concerned with improving schooling and enhancing the professional practices of educators. The authors focus on leadership for enhancing student outcomes, both academic and social. While recognizing the significance of the principal or headteacher in school leadership, the authors argue a strong case for the dispersal of leadership: * Based on extensive research conducted within schools * Focuses on leading learning across the school * Theoretically sound; reflects the theories of Bourdieu and Foucault * Politically aware; discusses the context of leadership within school communities, educational systems, global pressures, new policy directions Current, topical and thoughtful, Leading Learning is key reading for principals or headteachers, teachers, and other school leaders, policy makers and for students studying educational administration.
The third edition of this best-seller updates its detailed information about how to construct, evaluate, and use questionnaires, and adds an entirely new chapter on customer loyalty. Included are two different methods of sampling and determining an appropriate sample size for reliable results; the reliability and validity of results; real examples of customer satisfaction measures and how they can be used; guidelines for developing questionnaires; scale development; the concept of quality; frequencies; sampling error; two methods of determining important service or product characteristics as perceived by the customer; discussion on the measurement and meaning of customer loyalty, and methods for loyalty-based management. -Readers will gain a sound grasp of the scientific methodology used to construct and use questionnaires utilizing the author's systematic approach. They will be able to pinpoint and focus on the most relevant topics, and study both the qualitative and quantitative aspects of questionnaire design and evaluation. These and many more important scientific principles are presented in simple, understandable terms.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.