Quantitative marketing as a discipline started around the mid 60's and has been dominated by only a handful of individuals. Robert Blattberg is one of them and has been a leader in setting a research agenda for this discipline. The collection of articles in this book along with commentary by some of his doctoral students is a magnificent testament to the genius of Robert Blattberg. The chapters in this book are organized into six parts. The first part, titled ?Early Bob?, traces research which he completed during the first decade after he joined University of Chicago. The second part is titled ?Statistical Bob?. This part comprises papers that Robert wrote in characterizing the response of consumers to dealing. The third part is titled ?Promotional Bob?, and covers roughly a ten-year stretch from 1987 to 1996. The fourth part titled ?Big Bob?, describes Robert's contribution to and impact on marketing practice. The fifth part is titled ?Direct Bob?, and focuses on what customer level data should be gathered, how they should be organized, linked and analyzed, and what metrics should be used to assess customer value. The sixth and final part titled ?Micro-Macro Bob?, is not genre or area specific as much as an illustration of Robert's overall research interests in marketing-mix modeling.
The attempt to identify the emotional sources of religion goes back to antiquity. In an exploration that bridges science and spirituality, Robert C. Fuller makes the convincing case that a sense of wonder is a principal source of humanity's belief in the existence of an unseen order of life. Like no other emotion, Fuller argues, wonder prompts us to pause, admire, and open our hearts and minds. With a voice that seamlessly blends the scientific and the contemplative, Fuller defines wonder in keeping with the tradition of Socrates--as an emotion related to curiosity and awe that stimulates engagement with the immediate physical world. He draws on the natural and social sciences to explain how wonder can, at the same time, elicit belief in the existence of a more-than-physical reality. Chapters examining emotions in evolutionary biology and the importance of wonder in human cognitive development alternate with chapters on John Muir, William James, and Rachel Carson, whom Fuller identifies as "exemplars of wonder." The writings and lives of these individuals express a functional side of emotion: that the very survival of life on earth today may depend on the empathy, compassion, and care that are aroused by a sense of wonder. Forging new pathways between the social sciences, philosophy, belief, and cultural history, Wonder deepens our understanding of the complex sources of personal spirituality and fulfillment.
In a gentle and spiritual approach, Robert C. Jameson, MFT, presents simple and powerful techniques that are intended to be used regularly to achieve joy in everyday life. You will learn how to truly love yourself and have a healthy, functioning, long-term relationship that makes your heart sing through time. He uses his experience of over twenty years as a Marriage, Family Therapist to explain, in simplified language, how to approach your fears head on, how to transform events from the past into stepping stones, how to change your negative self-talk, how to express your "negative" emotions so you don't hurt yourself or others, and much more.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
The recent emergence of “two kingdoms” and “two cities” approaches to Christian social thinking are shown to have a key—and often unacknowledged—connection to Luther’s reshaping of the Augustinian paradigm. The project works for a better understanding of Luther’s own thought to help understand the convergences and divergences of Christian political theology in the twentieth century and today. In particular, Luther’s two-kingdom thinking issued forth in a strong distinction of law and gospel that was also worked out in twofold pairs of Israel and church, general and special revelation, creation and redemption, and especially the outward and inward life. The work traces this legacy through acceptance and modification by Niebuhr and Bonhoeffer, Lutheran and Catholic neoconservatives, Reformed two-kingdom proponents, Augustinian liberals, and finally Oliver O’Donovan. The conclusion reflects on both the historical narrative and its connection to an account of modern liberalism, as well as a theological reflection on hermeneutical decisions of the “twoness” of Christian theology.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
From an insider's perspective, Robert C. Post ... offers insight into the politics of display and the interpretation of history. Never before has a book about the Smithsonian detailed the recent and dramatic shift from collection-driven shows, with artifacts meant to speak for themselves, to concept-driven exhibitions, in which objects aim to tell a story, displayed like illustrations in a book"--Dust jacket flap.
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually caused by avoidable software defects. Having analyzed tens of thousands of vulnerability reports since 1988, CERT has determined that a relatively small number of root causes account for most of the vulnerabilities. Secure Coding in C and C++, Second Edition, identifies and explains these root causes and shows the steps that can be taken to prevent exploitation. Moreover, this book encourages programmers to adopt security best practices and to develop a security mindset that can help protect software from tomorrow’s attacks, not just today’s. Drawing on the CERT’s reports and conclusions, Robert C. Seacord systematically identifies the program errors most likely to lead to security breaches, shows how they can be exploited, reviews the potential consequences, and presents secure alternatives. Coverage includes technical detail on how to Improve the overall security of any C or C++ application Thwart buffer overflows, stack-smashing, and return-oriented programming attacks that exploit insecure string manipulation logic Avoid vulnerabilities and security flaws resulting from the incorrect use of dynamic memory management functions Eliminate integer-related problems resulting from signed integer overflows, unsigned integer wrapping, and truncation errors Perform secure I/O, avoiding file system vulnerabilities Correctly use formatted output functions without introducing format-string vulnerabilities Avoid race conditions and other exploitable vulnerabilities while developing concurrent code The second edition features Updates for C11 and C++11 Significant revisions to chapters on strings, dynamic memory management, and integer security A new chapter on concurrency Access to the online secure coding course offered through Carnegie Mellon’s Open Learning Initiative (OLI) Secure Coding in C and C++, Second Edition, presents hundreds of examples of secure code, insecure code, and exploits, implemented for Windows and Linux. If you’re responsible for creating secure C or C++ software–or for keeping it safe–no other book offers you this much detailed, expert assistance.
Numerical Computation Using C is a four-chapter text guide for learning C language from the numerical analysis viewpoint. C is a general-purpose language that has been used in systems programming. The first chapter discusses the basic principles, logic, operators, functions, arrays, and structures of C language. The next two chapters deal with the uses of the so-called pointers in the C language, which is a variable that contains the address of some object in memory. These chapters also elaborate on several constructs to show how the use of C language can be fine-tuned. The last chapter highlights the practical aspects of C language. This book will be of value to computer scientists and mathematicians.
“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described in this book breaks down complex software security topics into easy-to-follow rules with excellent real-world examples. It is an essential reference for any developer who wishes to write secure and resilient software in C and C++.” —Edward D. Paradise, vice president, engineering, threat response, intelligence, and development, Cisco Systems Secure programming in C can be more difficult than even many experienced programmers realize. To help programmers write more secure code, The CERT® C Coding Standard, Second Edition, fully documents the second official release of the CERT standard for secure coding in C. The rules laid forth in this new edition will help ensure that programmers’ code fully complies with the new C11 standard; it also addresses earlier versions, including C99. The new standard itemizes those coding errors that are the root causes of current software vulnerabilities in C, prioritizing them by severity, likelihood of exploitation, and remediation costs. Each of the text’s 98 guidelines includes examples of insecure code as well as secure, C11-conforming, alternative implementations. If uniformly applied, these guidelines will eliminate critical coding errors that lead to buffer overflows, format-string vulnerabilities, integer overflow, and other common vulnerabilities. This book reflects numerous experts’ contributions to the open development and review of the rules and recommendations that comprise this standard. Coverage includes Preprocessor Declarations and Initialization Expressions Integers Floating Point Arrays Characters and Strings Memory Management Input/Output Environment Signals Error Handling Concurrency Miscellaneous Issues
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT ® C Secure Coding Standard fills this need.” –Randy Meyers, Chairman of ANSI C “For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. Now CERT has embodied the advice of leading technical experts to give programmers and managers the practical guidance needed to avoid those problems in new applications and to help secure legacy systems. Well done!” –Dr. Thomas Plum, founder of Plum Hall, Inc. “Connectivity has sharply increased the need for secure, hacker-safe applications. By combining this CERT standard with other safety guidelines, customers gain all-round protection and approach the goal of zero-defect software.” –Chris Tapp, Field Applications Engineer, LDRA Ltd. “I’ve found this standard to be an indispensable collection of expert information on exactly how modern software systems fail in practice. It is the perfect place to start for establishing internal secure coding guidelines. You won’t find this information elsewhere, and, when it comes to software security, what you don’t know is often exactly what hurts you.” –John McDonald, coauthor of The Art of Software Security Assessment Software security has major implications for the operations and assets of organizations, as well as for the welfare of individuals. To create secure software, developers must know where the dangers lie. Secure programming in C can be more difficult than even many experienced programmers believe. This book is an essential desktop reference documenting the first official release of The CERT® C Secure Coding Standard. The standard itemizes those coding errors that are the root causes of software vulnerabilities in C and prioritizes them by severity, likelihood of exploitation, and remediation costs. Each guideline provides examples of insecure code as well as secure, alternative implementations. If uniformly applied, these guidelines will eliminate the critical coding errors that lead to buffer overflows, format string vulnerabilities, integer overflow, and other common software vulnerabilities.
Robert C. O'Brien's collection of essays on U.S. national security and foreign policy, with a forward by Hugh Hewitt, is a wake up call to the American people. The world has become steadily more dangerous under President Obama's "lead from behind" foreign policy. The Obama Administration's foreign policy has emboldened our adversaries and disheartened our allies. Indeed, Obama's nuclear deal with Iran is a 1938 moment. At the same time, the U.S. military has been cut and risks returning to the hollow force days of the 1970s. O'Brien lays out the challenges and provides the common sense "peace through strength" solutions that will allow the next president to make America great again.
If you don't fully understand C pointers and how they are used, you're not getting the most out of C programming. This book features complete coverage on using and controlling C language pointers to make C applications more powerful and expressive. This new edition is completely updated and revised to reflect the changes that have been brought about with the full adoption of ANSI C. All discussions and program examples have been updated, and reading materials necessary for any modern ANSI C programmer have also been added. Includes one 3 1/2" disk containing all of the working programs and modules found in the book. System Requirements: 286 or higher IBM PC or compatible. Includes three entirely new chapters and many new or revised programs covering the latest techniques and advances in C Provides a 3.5" disk containing all of the working programs and modules found within the text Explains pointers in a friendly, easy-to-follow style to allow for quick implentation of new techniques Serves as a useful tool to both beginning and intermediate programmers for mastering pointers Includes numerous examples to provide continued reinforcement of techniques
Object-Oriented Programming in C++ begins with the basic principles of the C++ programming language and systematically introduces increasingly advanced topics while illustrating the OOP methodology. While the structure of this book is similar to that of the previous edition, each chapter reflects the latest ANSI C++ standard and the examples have been thoroughly revised to reflect current practices and standards. Educational Supplement Suggested solutions to the programming projects found at the end of each chapter are made available to instructors at recognized educational institutions. This educational supplement can be found at www.prenhall.com, in the Instructor Resource Center.
Even by the scientists most closely associated with it, geoengineering – the deliberate intervention in the climate at global scale to mitigate the effects of climate change – is perceived to be risky. For all its potential benefits, there are robust differences of opinion over the wisdom of such an intervention. Systems Thinking for Geoengineering Policy is the first book to theorise geoengineering in terms of complex adaptive systems theory and to argue for the theoretical imperative of adaptive management as the default methodology for an effective low risk means of confronting the inescapable uncertainty and surprise that characterise potential climate futures. The book illustrates how a shift from the conventional Enlightenment paradigm of linear reductionist thinking, in favour of systems thinking, would promote policies that are robust against the widest range of plausible futures rather than optimal only for the most likely, and also unlock the policy paralysis caused by making long term predictions of policy outcomes a prior condition for policy formulation. It also offers some systems driven reflections on a global governance network for geoengineering. This book is a valuable resource for all those with an interest in climate change policy, geoengineering, and CAS theory, including academics, under- and postgraduate students and policymakers.
A committee is not the same thing as a team. To become a great team, a group must have a goal that is deeply challenging, a leader who is creatively empowering, and a willingness to work within a collaborative community that honors the Bible. The Bible is full of examples of great things accomplished through teaming leaders. Scripture also provides a compelling model from which church communities and teams can learn to live and serve in light of the "Divine Team" - the Trinity. Author Robert C. Crosby provides several innovative ways in which biblical teams reflect the workings and nature of the Trinity and thus the image of God. Revealing what he calls "The Four C's of Great Teams" - The Character, The Carrot, The Coach, and The Context - Crosby shows how successful teams reach their goals more effectively. Conversely, he also addresses the "Four Fatal Teaming Errors" and how to avoid unnecessary, time-consuming missteps. This book provides biblical motivations, vivid examples, and practical approaches for creating a teaming culture in any faith community. Crosby, a leader who has built teams as a senior pastor, youth leader, and university administrator, is now training and mentoring a new generation of pastors and leaders.
This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work. This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work. As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Robert Sedgewick has thoroughly rewritten and substantially expanded his popular work to provide current and comprehensive coverage of important algorithms and data structures. Many new algorithms are presented, and the explanations of each algorithm are much more detailed than in previous editions. A new text design and detailed, innovative figures, with accompanying commentary, greatly enhance the presentation. The third edition retains the successful blend of theory and practice that has made Sedgewick's work an invaluable resource for more than 250,000 programmers! This particular book, Parts 1-4, represents the essential first half of Sedgewick's complete work. It provides extensive coverage of fundamental data structures and algorithms for sorting, searching, and related applications. The algorithms and data structures are expressed in concise implementations in C, so that you can both appreciate their fundamental properties and test them on real applications. Of course, the substance of the book applies to programming in any language. Highlights Expanded coverage of arrays, linked lists, strings, trees, and other basic data structures Greater emphasis on abstract data types (ADTs) than in previous editions Over 100 algorithms for sorting, selection, priority queue ADT implementations, and symbol table ADT (searching) implementations New implementations of binomial queues, multiway radix sorting, Batcher's sorting networks, randomized BSTs, splay trees, skip lists, multiway tries, and much more Increased quantitative information about the algorithms, including extensive empirical studies and basic analytic studies, giving you a basis for comparing them Over 1000 new exercises to help you learn the properties of algorithms Whether you are a student learning the algorithms for the first time or a professional interested in having up-to-date reference material, you will find a wealth of useful information in this book.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.