Browse Results

Showing 99,926 through 99,950 of 100,000 results

The Trusted Learning Advisor: The Tools, Techniques and Skills You Need to Make L&D a Business Priority

by Keith Keating

How can I make learning part of the overall company strategy? How do I convince key stakeholders of the value of L&D? How can I develop a proactive approach to L&D rather than reactive? L&D professionals can achieve all these things and more by becoming a trusted learning advisor rather than an order taker. The Trusted Learning Advisor is full of practical tips, tools, and case studies outlining the path learning practitioners need to follow to transform from order takers into strategic consultative business partners.This essential guide includes strategies for developing skills needed to build trust and relationships with stakeholders, practical advice on connecting the learning strategy to business strategy, and communicating all of this to the organization. It also has additional support on critical thinking, communication and influencing skills as well as advice on how to master a growth mindset. Written by an author with over 20 years' experience in the industry, locate the skills that are needed by L&D professionals to become strategic consultive partners by driving value for organizations and unlocking potential. This is crucial reading for all L&D practitioners looking to develop their role as well as positively impact lives through the power of learning and adding true value to the organization.

The Trusted Leader

by Robert M. Galford Anne Seibold Drapeau

Any good manager feels an intuitive need to build trust inside his or her company and among employees. Self-improvement is an integral part of creating a trust-building climate and current books on leadership and corporate issues understate the importance of this element. Developing further the ideas in THE TRUSTED ADVISOR, the authors move from discussing how managers can make themselves and their company trustworthy to clients and customers to how they can build trust within an organization, between manager and colleagues, bosses, and employees. Instead of focusing on Business to Business, The Trusted Leader deals with building internal, managerial and organizational trust. The authors parse the different kinds of trust, give diagnostic ways to determine whether trust is missing and where it needs to be supplemented, and ways to restore trust when it has been betrayed. The book will contain numerous exercises and quizzes, as well as formulas that quantify the economies of trust and show its importance in an organization. Stories of managers and employees working through issues of trust in many different real-life situations cover many different corporate situations and scenarios (acquisitions, slowdowns, and internal and external crises), making this the most complete guide on the subject for managers.xecutive departures are often trust-destroyers. The Trusted Leader examines those defining moments, and helps leaders turn such situations into trust-building experiences, creating a culture and legacy of trust throughout the organization at large. Rich in true stories, examples, and practical advice, The Trusted Leader guides leaders on how to climb the ladder of trust and how to secure their legacy as trusted leaders. For managers of all levels, The Trusted Leader is the only comprehensive guide for building trust inside an organization -- the key to every company's long-term survival and success.

Trusted Leader: 8 Pillars That Drive Results

by David Horsager

Without trust, people and businesses fail. Trusted Leader provides a framework for building trust so that you and your organizations can perform at your best."A lack of trust is your biggest expense," says Wall Street Journal bestselling author David Horsager. Without trust, transactions cannot occur. Without trust, influence is destroyed. Without trust, leaders lose their people. Trust can be either your most vulnerable weakness or your greatest asset. Horsager introduces readers to his Eight Pillars of Trust through the journey of a senior leader who thought success was certain. Follow CEO Ethan Parker as he discovers the power of trust and how to apply it amid the complexities of leadership, change, and culture transformation. The Eight Pillars of Trust (Clarity, Compassion, Character, Competency, Commitment, Connection, Contribution, and Consistency) are based on Horsager's original research and extensive experience working with Fortune 500 companies and top government agencies around the globe. In addition to the business parable, this book is rich in practical advice for implementing each of the Eight Pillars. You will learn strategies to increase alignment, overcome attrition, and get absolutely clear on executing your top priorities. Horsager offers a road map for how to become the most trusted expert in your industry.

The Trusted Leader: Building the Relationships that Make Government Work

by Terry N. Newell Grant Reeher Peter Ronayne

Improving government on a macro level is only possible with public managers who herald change on a micro level. While many studies of government reform focus on new policies and programs, these public managers—building relationships built on trust—are the real drivers behind many successful reforms.In this second edition, chapter authors once again draw on their real-world experience to demonstrate the importance of values-based leadership. With new research and lessons from the first two years of the Obama administration, chapters focus on the concrete ways in which leaders build effective relationships and trust, while also improving themselves, their organizations, and those they coach. Surveying agencies both horizontally and vertically, The Trusted Leader also addresses how public managers can collaborate with political appointees and the legislative branch, while still engaging with citizens to create quality customer experiences.Two brand-new chapters focus on:“Effective Conversations”—the importance of one-on-one conversations to building trust, with a model for having such conversations.“The Diversity Opportunity”—the need to effectively lead across a diverse workforce and a diverse society to build trust in both realms. With the addition of chapter headnotes, the editors provide necessary context, while the new “Resources for Further Learning” feature guides readers toward additional print and web resources.

Trusted Guardian: Information Sharing and the Future of the Atlantic Alliance

by Damon Coletta

The exploitation of superior US systems for the collection, analysis and distribution of information currently undermines US leadership in the context of transatlantic crisis management. The USA's clear lead in information technology creates political liabilities with respect to both allies and adversaries, while political-technical tradeoffs warrant a more open approach to information systems, information production, and information sharing among allies. Clearly distinguishing the role of information in winning wars versus managing crises, this book extends existing models for how breakdowns occur in international bargaining. Allies, who share preferences but not the resolve of a coalition leader, are brought into the explanation for war as a rational outcome of incomplete information. Case studies ranging from Cold War Berlin to the War in Iraq illustrate how national classified systems that underwrite large margins of victory in conventional combat fail to inspire trust among allies during the crucial, preceding stage of crisis bargaining. The volume offers powerful arguments for a new direction in defence transformation.

The Trusted Executive: Nine Leadership Habits that Inspire Results, Relationships and Reputation

by John Blakey

The Trusted Executive helps leaders create a strategy for building trust in a globalized, technology-enabled, diverse and increasingly sceptical world. Through innovative coaching exercises, self-assessment exercises, inspirational interviews with international CEOs and underpinned by rigorous academic research, The Trusted Executive gives leaders the tools to build trust through three key pillars: ability, integrity and benevolence. Underpinning these pillars lie nine habits of trustworthiness; habits that will enable executives to deliver outstanding results, inspiring relationships and a positive contribution to society. With tools for measuring and developing leadership trust and focused strategies for handling trust violations, The Trusted Executive takes account of the ever-changing, increasingly diverse and multi-generational work environment. An essential tool for leaders who want to create a positive long-term legacy.

The Trusted Executive: Nine Leadership Habits that Inspire Results, Relationships and Reputation

by John Blakey

SHORTLISTED: CMI Management Book of the Year 2017 - Commuter's Read Category (previous edition)The Trusted Executive helps leaders deliver outstanding results, create inspiring relationships and provide a positive contribution through the power of trustworthy leadership. In the shifting world of business, affected by trends involving robotics, AI, data privacy, the #metoo movement, climate crisis, employment rights and income inequality, trust and truthfulness have become the agenda. But how can business leaders and executives build trust in an untrusting world?The Trusted Executive, gives leaders the tools to build trust by focusing on ability, integrity and benevolence. Providing a range of tools, exercises, examples and case studies, the fully updated edition will help readers: - Understand the primary role of trust as a leadership skill - Build trust around themselves as a leader, and develop role modelling behaviours - Lead transformation change within their own organization - Develop strategies to deal with unwanted violations of trust within their business

Trusted Execution Environments

by Konstantinos Markantonakis Carlton Shepherd

Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings.A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow.This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.

Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention And Detection

by Hassan Salmani

This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.

Trusted Data, revised and expanded edition: A New Framework for Identity and Data Sharing

by Thomas Hardjono David L. Shrier Alex Pentland

How to create an Internet of Trusted Data in which insights from data can be extracted without collecting, holding, or revealing the underlying data.Trusted Data describes a data architecture that places humans and their societal values at the center of the discussion. By involving people from all parts of the ecosystem of information, this new approach allows us to realize the benefits of data-driven algorithmic decision making while minimizing the risks and unintended consequences. It proposes a software architecture and legal framework for an Internet of Trusted Data that provides safe, secure access for everyone and protects against bias, unfairness, and other unintended effects. This approach addresses issues of data privacy, security, ownership, and trust by allowing insights to be extracted from data held by different people, companies, or governments without collecting, holding, or revealing the underlying data. The software architecture, called Open Algorithms, or OPAL, sends algorithms to databases rather than copying or sharing data. The data is protected by existing firewalls; only encrypted results are shared. Data never leaves its repository. A higher security architecture, ENIGMA, built on OPAL, is fully encrypted.ContributorsMichiel Bakker, Yves-Alexandre de Montjoye, Daniel Greenwood, Thomas Hardjoni, Jake Kendall, Cameron Kerry, Bruno Lepri, Alexander Lipton, Takeo Nishikata, Alejandro Noriega-Campero, Nuria Oliver, Alex Pentland, David L. Shrier, Jacopo Staiano, Guy ZyskindAn MIT Connection Science and Engineering Book

Trusted Computing Platforms

by Graeme Proudler Liqun Chen Chris Dalton

In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.

Trusted Computing for Embedded Systems

by Bernard Candaele Dimitrios Soudris Iraklis Anagnostopoulos

This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. · Enables readers to address a variety of security threats to embedded hardware and software; · Describes design of secure wireless sensor networks, to address secure authentication of trusted portable devices for embedded systems; · Presents secure solutions for the design of smart-grid applications and their deployment in large-scale networked and systems.

Trusted Computing and Information Security

by Ming Xu Zheng Qin Fei Yan Shaojing Fu

This book constitutes the refereed proceedings of the 11th Chinese Conference on Trusted Computing and Information Security, CTCIS 2017, held in Changsha, China, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from 96 submissions. The papers focus on topics such as theory of trusted computing, trustworthy software; infrastructure of trusted computing, application and evaluation of trusted computing; network security and communication security; theory and technology of cryptographic techniques; information content security; system security for mobile network and IoT systems, industrial control and embedded systems; security for Cloud computing, virtualization systems and big data.

Trusted Computing and Information Security: 12th Chinese Conference, CTCIS 2018, Wuhan, China, October 18, 2018, Revised Selected Papers (Communications in Computer and Information Science #960)

by Huanguo Zhang Bo Zhao Fei Yan

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2018, held in Wuhan, China, in October 2018.The 24 revised full papers presented were carefully reviewed and selected from 73 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, and network security.

Trusted Computing and Information Security: 13th Chinese Conference, CTCIS 2019, Shanghai, China, October 24–27, 2019, Revised Selected Papers (Communications in Computer and Information Science #1149)

by Liehuang Zhu Fei Yan Weili Han

This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019.The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.

Trusted Cellular IoT Devices: Design Ingredients and Concepts (Synthesis Lectures on Engineering, Science, and Technology)

by Kersten Heins

This book focuses on the impact of secure frontend devices for the Internet of Things (IoT). It explains how to identify vulnerabilities of IoT applications and how to protect them against misuse and attacks. Provided insights will help readers to design a reliable and trustworthy IoT ecosystem ensuring a high level of user confidence and a fruitful deployment. As a starting point, the book provides guidance how to identify risks and potential threats. Then, it explains which countermeasures are available and introduces all major ingredients for an efficient implementation of IoT security measures, e.g. a bullet-proof protection of user privacy and device identities. The author outlines an efficient design approach that combines classical embedded computing with smartcard technology and wireless cellular networking like LTE-M or NB-IoT. The target audience includes industrial professionals and students focusing on low cost design and a fast time-to-market. The book is ideal for engineering-minded IoT project owners to safeguard their business goals.

Trusted Bond (Change of Heart #2)

by Mary Calmes

Sequel to Change of HeartChange of Heart: Book TwoJin Rayne is having trouble adjusting to the new life he’s supposed to love. Instead of adapting to being the mate of tribe leader Logan Church, Jin can't get past the fact that his lover was straight before they met. He's discovered the joy in belonging to Logan but fears his new life could disappear at a moment’s notice, despite Logan's insistence that they are forever, end of story.Jin wants to trust Logan, but that desire will be put to the test both by a rival tribe leader and by a startling revelation about Jin's existence. At stake is Jin's life and his place in the tribe. If he's going to survive to see Logan again, he'll have to release his fear and freely accept the bond, for only then can he truly trust.

Trusted Advisor in Marketing und Vertrieb

by Josef G. Böck

Dieses Buch beschreibt, wie vertrauensvoll beratende Experten – Trusted Advisor – die Marketing- und Vertriebsstrategien in Organisationen wirkungsvoll unterstützen und damit erfolgreicher machen können. Unternehmer, Marketingmanager, Vertriebsverantwortliche, Vertriebsmitarbeiter und Selbstständige erfahren, welche Beziehung sich zu ihren Kunden entwickelt, wenn sie sich als gewissenhafte und glaubwürdige Berater positionieren. Der Ehrgeiz, den Kunden in komplexen Entscheidungssituationen immer wieder zur besten Wahl aus den zur Verfügung stehenden Optionen zu verhelfen, öffnet dem Vertrieb neue Türen. Am Beispiel von Rechts- und Steuerberatern, IT-Spezialisten, Finanz- und Bankberatern sowie Versicherungsvermittlern werden individuelle Voraussetzungen beschrieben, konkrete Vorschläge für die Implementierung des Konzepts gemacht und die Umsetzung durch eine Toolbox praktisch unterstützt.

The Trusted Advisor Fieldbook

by Andrea P. Howe Charles H. Green

A practical guide to being a trusted advisor for leaders in any industryIn this hands-on successor to the popular book The Trusted Advisor, you'll find answers to pervasive questions about trust and leadership--such as how to develop business with trust, nurture trust-based relationships, build and run a trustworthy organization, and develop your trust skill set. This pragmatic workbook delivers everyday tools, exercises, resources, and actionable to-do lists for the wide range of situations a trusted advisor inevitably encounters. The authors speak in concrete terms about how to dramatically improve your results in sales, relationship management, and organizational performance.Your success as a leader will always be based on the degree to which you are trusted by your stakeholders. Each chapter offers specific ways to train your thinking and your habits in order to earn the trust that is necessary to be influential, successful, and known as someone who makes a difference.Self-administered worksheets and coaching questions provide immediate insights into your current business challengesReal-life examples demonstrate proven ways to "walk the talk"Action plans bridge the gap between insights and outcomesPut the knowledge and practices in this fieldbook to work, and you'll be someone who earns trust quickly, consistently, and sustainably--in business and in life.

The Trusted Advisor

by Robert Galford David H. Maister Charles Green

Beside talent and a sterling portfolio, what can world-class consultants like Deloitte & Touche, Societe General and Towers Perrin boast has helped them achieve success in our entrepreneurial economy? They all have the inside track on the indispensable "Trusted Advisor" model for client relationships, created by renowned experts Charles Green and Robert Galford. Now Green and Galford have teamed up with the acclaimed David Maister in order to help their latest high-profile, fast-forward client: you. In this straightforward guide, Maister, Green and Galford show readers that the key to professional success goes well beyond technical mastery or expertise. Today, it's all about the vital ability to earn the client's trust and thereby win the ability to influence them. In these high risk times, trust is more valuable than gold. With this critical, highly detailed and accessible resource, readers will learn the five crucial steps for developing, managing and improving client confidence. For both emerging and established entrepreneurs and consultants, THE TRUSTED ADVISOR is the first truly indispensable business book of the decade.

The Trusted Advisor: A Comprehensive Toolkit For Leading With Trust

by David H. Maister Charles H. Green Robert M. Galford

In today's fast-paced networked economy, professionals must work harder than ever to maintain and improve their business skills and knowledge. But technical mastery of your discipline is not enough, assert world-renowned professional advisors David H. Maister, Charles H. Green, and Robert M. Galford. The key to professional success, they argue, is the ability to earn the trust and confidence of clients. The creation of trust is what earns the right to influence clients; trust is also at the root of client satisfaction and loyalty. The workings of trust are even more critical in the new economy than in the old. Maister, Green, and Galford enrich our understanding of trust -- yet they have also written a deeply practical book. Using their model of "The Trust Equation," they dissect the rational and emotional components of trustworthiness. With precision and clarity, they detail five distinct steps you must take to create a trust-based relationship. Each step -- engage, listen, frame, envision, and commit -- is richly described in distinct chapters. The book is peppered with pragmatic "top ten" lists aimed at improving advisors' effectiveness that can be put to use instantly. It also includes a trust self-diagnostic in the appendix. This immensely readable book will be welcomed by the inexperienced advisor and the most seasoned expert alike. The authors use anecdotes, experiences, and examples -- successes and mistakes, their own and others' -- to great effect. Though they use the professional services advisor/client paradigm throughout the book, their prescriptions have resonance for other trust-reliant situations -- selling, customer relationship management, and internal staff functions like HR and information technology. The result is a tour de force -- brilliant, penetrating, unique. It is essential reading for anyone who must advise, negotiate, or manage complex relationships with others.

Trusted

by John M Green

Imagine a global depression caused, not by greed or stupidity, but by a secret band of brilliant eco-terrorists intent on saving the planet by slashing its population and annihilating its resource-hungry economy.Members of radical environmentalist group, 9S, have spent ten years secretly infiltrating industry and government, working themselves into the most trusted jobs in the world.When the first global catastrophe erupts, the finger points at Australian-born Dr Tori Swyft, an ex-CIA officer. Trying to clear her name, she uncovers the 9S group's dark conspiracy... but is there time to expose and stop them? They are the most trusted... until they betray their trust.

Trustbuilding: An Honest Conversation on Race, Reconciliation, and Responsibility

by Rob Corcoran Tim Kaine

"Trustbuilding, using personal narrative and exhaustive reporting by Rob Corcoran, chronicles how Hope in the Cities has moved what looked like an immoveable barricade. The job is not done, but Hope in the Cities has provided a map for the future."--from the foreword by Governor Tim KaineThe national director of Initiatives of Change and founder of Hope in the Cities, Rob Corcoran has been involved in promoting dialogue and conflict reconciliation among diverse and polarized racial, ethnic, and religious groups in an array of locales in Europe, South Africa, India, and the United States for over thirty years. Trustbuilding is part historical narrative and part handbook for a model of dialogue and community change that has been adopted both nationally and internationally. At its center is the story of how Richmond, Virginia, a former slave market, capital of the Confederacy, and leading proponent of Massive Resistance, has become a seedbed for inter-racial dialogue and trustbuilding with national and international implications. In 1993, this conservative southern city caught the attention of the nation with a public acknowledgment of its painful history and a call for "an honest conversation on race, reconciliation, and responsibility." City and county residents of all backgrounds launched an unprecedented and sustained effort to address the "toxic issue of race." Known as Hope in the Cities, this endeavor is now in its second decade of work. Trustbuilding should extend its important mission by carrying Richmond's story to communities everywhere.

The Trustafarian Handbook

by Brian Griffin

For years, a moldy slice of the upper crust has been slumming it in disguise. Sitting on stoops, smoking up, and trying to blend in with the common broke folk by wearing worn-out jeans (though really stylishly distressed), drinking PBR (even though the family owns a vineyard), and not paying rent (that's what parents are for). Meet the Trustafarian counter-counter-culture.These young men and women have gone from the country club to the community pool--by choice, to look cool. They've adopted the free-spiritedness and outward appearance of the hippie, Rasta, and Bohemian sets . . . while retaining a few minor perks from their privileged upbringing, the 7-series, the summer home, and the money to burn. Inside, you will learn everything you ever wanted to know about the Trustafarian culture--from information on their formative years to their fashion choices to their fornication rituals. Get the scoop on Impostafarians, Brohemians, Fauxlanthropists, and their kept, but unkempt brethren. And next time, you'll be in the know rather than scratching your head when you see that homeless-looking guy hop into his brand-new Audi.

The Trustafarian Handbook: A Field Guide to the Neo-Hippie Lifestyle - Funded by Mom and Dad

by Brian Griffin

For years, a moldy slice of the upper crust has been slumming it in disguise. Sitting on stoops, smoking up, and trying to blend in with the common broke folk by wearing worn-out jeans (though really stylishly distressed), drinking PBR (even though the family owns a vineyard), and not paying rent (that’s what parents are for). Meet the Trustafarian counter-counter-culture.These young men and women have gone from the country club to the community pool--by choice, to look cool. They’ve adopted the free-spiritedness and outward appearance of the hippie, Rasta, and Bohemian sets . . . while retaining a few minor perks from their privileged upbringing, the 7-series, the summer home, and the money to burn.Inside, you will learn everything you ever wanted to know about the Trustafarian culture--from information on their formative years to their fashion choices to their fornication rituals. Get the scoop on Impostafarians, Brohemians, Fauxlanthropists, and their kept, but unkempt brethren. And next time, you’ll be in the know rather than scratching your head when you see that homeless-looking guy hop into his brand-new Audi.

Refine Search

Showing 99,926 through 99,950 of 100,000 results