Attack of the Customers


Book Description

This book " ... explains how social media can be used to destroy as well as to build. It offers actionable strategies to prevent and prepare for disasters before they strike your company. And it shows you how creative engagement can turn critics into raving fans."--Back cover.




Guerrilla Marketing Attack


Book Description

At a time when millions of small businesses are flourishing, here is the optimum plan of attack for businesses that want to cash in on the high profits and low costs of guerrilla marketing.




Attack at the Arena


Book Description

Over 1 million sold in series! Patrick and Beth learn that Mr. Whittaker’s fancy ring can be seen inside the Imagination Station but not outside of the machine. A mysterious letter leads the cousins to fifth-century Rome in search of a special cup that belongs to a monk. If found, the cup could keep the mysterious Albert out of prison. At the Roman Colosseum, Emperor Honorius is hosting a gladiator battle in celebration of a war victory. Beth attends the event as the emperor’s slave; Patrick attends as a monk’s apprentice but is taken prisoner and sent to fight in the arena. During their adventure, the cousins meet Telemachus (a true historical figure), a monk who believes that fighting is wrong. Telemachus is willing to risk everything—even his life—to stop the killing. When the cousins return with the cup, they find that a third letter has been sent with more information about Albert’s fate.




Attack of the Theater People


Book Description

In praising “the witty high school romp” How I Paid for College, the New York Times Book Review said, it “makes you hope there’s a lot more where this came from.” There is. In this hilarious sequel Attack of the Theater People, Edward Zanni and his merry crew of high school musical-comedy miscreants move to the magical wonderland that is Manhattan. It is 1986, and aspiring actor Edward Zanni has been kicked out of drama school for being “too jazz hands for Juilliard.” Mortified, Edward heads out into the urban jungle of eighties New York City and finally lands a job as a “party motivator” who gets thirteen-year-olds to dance at bar mitzvahs and charms businesspeople as a “stealth guest” at corporate events. When he accidentally gets caught up in insider trading with a handsome stockbroker named Chad, only the help of his crew from How I Paid for College can rescue him from a stretch in Club Fed. Laced with the inspired zaniness of classic American musical comedy, Attack of the Theater People matches the big hair of the eighties with an even bigger heart.




The Chameleon Attack (Battle Bugs #4)


Book Description

Never leave a bug behind-- collect all the Battle Bugs books! Sneak attack!An eerie glow from his insect encyclopedia alerts Max Darwin to return to Bug Island. Commander Barton needs Max's help to build a defensive watchtower fortress. In no time, however, chameleons and geckos lay siege to the cliffs around the new camp. The lizards want to destroy the fortress--and take over Bug Island once and for all!




CSO


Book Description

The business to business trade publication for information and physical Security professionals.




The Regional Office Is Under Attack!


Book Description

Read it!” —Jess Walter, New York Times bestselling author of Beautiful Ruins "[R]ollicking good fun.” —New York Times Book Review "A tour-de-force." —Laura Miller, Slate In a world beset by amassing forces of darkness, one organization—the Regional Office—and its coterie of super-powered female assassins protects the globe from annihilation. At its helm, the mysterious Oyemi and her oracles seek out new recruits and root out evil plots. Then a prophecy suggests that someone from inside might bring about its downfall. And now, the Regional Office is under attack. Recruited by a defector from within, Rose is a young assassin leading the attack, eager to stretch into her powers and prove herself on her first mission. Defending the Regional Office is Sarah—who may or may not have a mechanical arm—fiercely devoted to the organization that took her in as a young woman in the wake of her mother’s sudden disappearance. On the day that the Regional Office is attacked, Rose’s and Sarah’s stories will overlap, their lives will collide, and the world as they know it just might end. Weaving in a brilliantly conceived mythology, fantastical magical powers, teenage crushes, and kinetic fight scenes, The Regional Office Is Under Attack! is a seismically entertaining debut novel about revenge and allegiance and love.




Attack of the Cute


Book Description




Fans! Not Customers: Third Edition


Book Description

Most companies plod along doing things as everyone always has. So there are huge opportunities for people trying to break the mould, even in old-fashioned businesses like banking or insurance. Of course it happens all the time in the digital world, but it can happen anywhere - so long as you turn your customers into fans. When that happens your customers - who will sing your praises when your competitors' customers are grumbling all the time - become your greatest allies in marketing and sales. Then you can really go for growth. But to amaze and delight your customers and clients isn't easy, and requires constant work and innovation - this book, generously scattered with examples and case studies drawn from Vernon Hill's own experience shows how it is to be done.




Information Security


Book Description

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place in Singapore, from 20th to 23rd September 2005. ISC 2005 brought together individuals from academia and - dustry involvedin manyresearchdisciplines of information security to foster the exchange of ideas. During recent years this conference has tried to place special emphasis on the practical aspects of information security, and since it passed from being an international workshop to being an international conference in 2001, it has become one of the most relevant forums at which researchers meet and discuss emerging security challenges and solutions. Advised by the ISC Steering Committee, and in order to provide students with more opportunities for publication, ISC 2005 accepted extra student papers - sides the regular papers. The initiative was very well accepted by the young sector of the scienti?c community, and we hope that the success of this idea will remainfornextISCevents. AnotherimportantfactorforthesuccessofISC2005 was that selected papers in the proceedings will be invited for submission to a special issue of the InternationalJournalof InformationSecurity. The result was an incredible response to the call for papers; we received 271 submissions, the highest since ISC events started. It goes without saying that the paper selection process was more competitive and di?cult than ever before — only 33 regular papers were accepted, plus 5 student papers for a special student session.