The Software Finder


Book Description




Computerworld


Book Description

For more than 40 years, Computerworld has been the leading source of technology news and information for IT influencers worldwide. Computerworld's award-winning Web site (Computerworld.com), twice-monthly publication, focused conference series and custom research form the hub of the world's largest global IT media network.







Finder's Fee


Book Description

'I know your secret if you defy me, then the world will know.' A terrifying phone call sweeps rich and powerful businesswoman Judith Find into a desperate search for a kidnapped boy. If she involves the authorities, the child will die ... and Judith's darkest secret to the world. Judith is teamed with a mysterious stranger with a carefully guarded secret of his own. But is Luke Becker an unwilling ally or an agent of the kidnapper? As Judith and Luke's mutual distrust wars against a growing attraction, the life of a small boy hangs in the balance. A boy unlike any other Judith has ever met. Eight-year-old Abel Palek will help Judith discover a faith and a life she has never imagined. But freeing him could cost her everything. Her career. Her reputation. And very possibly her life.







Intelligence and Security Informatics


Book Description

The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http://www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response.




Macworld


Book Description




Newsletter


Book Description




PC Mag


Book Description

PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.




InfoWorld


Book Description

InfoWorld is targeted to Senior IT professionals. Content is segmented into Channels and Topic Centers. InfoWorld also celebrates people, companies, and projects.