- Table View
- List View
By the author of the bestselling The Pardon, this fast-paced novel teams a resourceful FBI agent and an embattled journalist in a hunt for two men -- a serial killer and his elusive informant. When an informer chooses Miami Tribune crime reporter Michael Posten as his conduit, giving him information about murders that haven't yet taken place, investigators speculate on whether the killer and informer are the same person. As the newspaper continues to deposit larger sums into the killer's account, FBI agent Victoria Santos and the reluctant journalist join forces to prevent the next gruesome murder. But then dues stop and the murders continue... until a psychopath makes one mistake too many. This gripping, unpredictable story of revenge will not be soon forgotten.
A reporter reveals the script-like convoluted tale, complete with a cast of main characters, of an Archer Daniels Midland executive who acted as an FBI informant to uncover a price- fixing conspiracy at this powerful US corporation in the mid-1990s. Lacks an index. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Historian Gary May reveals the untold story of the murder of civil rights worker Viola Liuzzo, shot to death by members of the violent Birmingham Ku Klux Klan at the end of Martin Luther King's historic Voting Rights March in 1965. The case drew national attention and was solved almost instantly, because one of the Klansman present during the shooting was Gary Thomas Rowe, an undercover FBI informant. At the time, Rowe's information and subsequent testimony were heralded as a triumph of law enforcement. But as Gary May reveals in this provocative and powerful book, Rowe's history of collaboration with both the Klan and the FBI was far more complex. Based on previously unexamined FBI and Justice Department Records,The Informant demonstrates that in their ongoing efforts to protect Rowe's cover, the FBI knowingly became an accessory to some of the most grotesque crimes of the Civil Rights era--including a vicious attack on the Freedom Riders and perhaps even the bombing of the Sixteenth Street Baptist Church. A tale of a renegade informant and an intelligence system ill-prepared to deal with threats from within,The Informant offers a dramatic and cautionary tale about what can happen when secret police power goes unchecked.
James Gleick, the author of the best sellers Chaos and Genius, now brings us a work just as astonishing and masterly: a revelatory chronicle and meditation that shows how information has become the modern era's defining quality--the blood, the fuel, the vital principle of our world. The story of information begins in a time profoundly unlike our own, when every thought and utterance vanishes as soon as it is born. From the invention of scripts and alphabets to the long-misunderstood talking drums of Africa, Gleick tells the story of information technologies that changed the very nature of human consciousness. He provides portraits of the key figures contributing to the inexorable development of our modern understanding of information: Charles Babbage, the idiosyncratic inventor of the first great mechanical computer; Ada Byron, the brilliant and doomed daughter of the poet, who became the first true programmer; pivotal figures like Samuel Morse and Alan Turing; and Claude Shannon, the creator of information theory itself. And then the information age arrives. Citizens of this world become experts willy-nilly: aficionados of bits and bytes. And we sometimes feel we are drowning, swept by a deluge of signs and signals, news and images, blogs and tweets. The Information is the story of how we got here and where we are heading.From the Hardcover edition.
With some six billion mobile subscriptions now in use worldwide, around three-quarters of the world's inhabitants now have access to a mobile phone. Mobiles are arguably the most ubiquitous modern technology - in some developing countries, more people have access to a mobile phone than to clean water, a bank account or even electricity. Mobile communications now offer major opportunities to advance human development - from providing basic access to education or health information to making cash payments and stimulating citizen involvement in democratic processes. This 2012 edition of the World Bank's Information and Communication for Development Report analyses the growth and evolution of mobile telephony, and the rise of data-based services delivered to handheld devices, including 'apps' or smartphone applications. The report explores the consequences for development of the emerging 'app economy'. It summarises current thinking and seeks to inform the debate on the use of mobile phones for development. This report looks, in particular, at key ecosystem-based applications in agriculture, health, financial services, employment and government, with chapters devoted to each. It's no longer about the phone itself, but about how it is used, and the content and applications that mobile phones open up. Mobile applications not only empower individual users, they enrich their lifestyles and livelihoods, and boost the economy as a whole. Mobile apps make phones immensely powerful as portals to the online world. A new wave of apps and 'mash-ups' of services, driven by high-speed networks, social networking, online crowdsourcing and innovation, is helping mobile phones transform the lives of people in developed and developing countries alike. The report finds that mobile applications not only empower individuals, but have important cascade effects stimulating growth, entrepreneurship and productivity throughout the economy as a whole. Mobile communications promise to do more than just give the developing world a voice - they unlock the genie in the phone, empowering people to make their own choices and decisions.
This course gives the student a broad introduction to basics in signal processing and information theory.
Many scientists regard mass and energy as the primary currency of nature. In recent years, however, the concept of information has gained importance. Why? In this book, eminent scientists, philosophers and theologians chart various aspects of information, from quantum information to biological and digital information, in order to understand how nature works. Beginning with an historical treatment of the topic, the book also examines physical and biological approaches to information, and its philosophical, theological and ethical implications.
The post-Ajaxian Web 2.0 world of wikis, folksonomies, and mashups makes well-planned information architecture even more essential. How do you present large volumes of information to people who need to find what they're looking for quickly? This classic primer shows information architects, designers, and web site developers how to build large-scale and maintainable web sites that are appealing and easy to navigate. The new edition is thoroughly updated to address emerging technologies -- with recent examples, new scenarios, and information on best practices -- while maintaining its focus on fundamentals. With topics that range from aesthetics to mechanics, Information Architecture for the World Wide Web explains how to create interfaces that users can understand right away. Inside, you'll find:An overview of information architecture for both newcomers and experienced practitioners The fundamental components of an architecture, illustrating the interconnected nature of these systems. Updated, with updates for tagging, folksonomies, social classification, and guided navigationTools, techniques, and methods that take you from research to strategy and design to implementation. This edition discusses blueprints, wireframes and the role of diagrams in the design phaseA series of short essays that provide practical tips and philosophical advice for those who work on information architectureThe business context of practicing and promoting information architecture, including recent lessons on how to handle enterprise architectureCase studies on the evolution of two large and very different information architectures, illustrating best practices along the wayHow do you document the rich interfaces of web applications? How do you design for multiple platforms and mobile devices? With emphasis on goals and approaches over tactics or technologies, this enormously popular book gives you knowledge about information architecture with a framework that allows you to learn new approaches -- and unlearn outmoded ones.
Want to design distinctive, cohesive web sites that "work"? This updated bestseller teaches you how to blend aesthetics and mechanics for web sites and intranets that are easy to navigate and appealing to your users, scalable and simple to maintain. Most books on web development concentrate on either the graphics or the technical issues of a site. This book focuses on the framework that holds the two together.
The modern human animal spends upwards of 11 hours out of every 24 in a state of constant consumption. Not eating, but gorging on information ceaselessly spewed from the screens and speakers we hold dear. Just as we have grown morbidly obese on sugar, fat, and flour--so, too, have we become gluttons for texts, instant messages, emails, RSS feeds, downloads, videos, status updates, and tweets. We're all battling a storm of distractions, buffeted with notifications and tempted by tasty tidbits of information. And just as too much junk food can lead to obesity, too much junk information can lead to cluelessness. The Information Diet shows you how to thrive in this information glut--what to look for, what to avoid, and how to be selective. In the process, author Clay Johnson explains the role information has played throughout history, and why following his prescribed diet is essential for everyone who strives to be smart, productive, and sane. In The Information Diet, you will: Discover why eminent scholars are worried about our state of attention and general intelligence Examine how today's media--Big Info--give us exactly what we want: content that confirms our beliefs Learn to take steps to develop data literacy, attention fitness, and a healthy sense of humor Become engaged in the economics of information by learning how to reward good information providers Just like a normal, healthy food diet, The Information Diet is not about consuming less--it's about finding a healthy balance that works for you
Jean-Baptiste Colbert saw governance of the state not as the inherent ability of the king, but as a form of mechanical mastery of subjects such as medieval legal history, physics, navigation, and the price lists of nails, sails, and gunpowder. In The Information Master, Jacob Soll shows how the legacy of Colbert's encyclopedic tradition lies at the very center of the rise of the modern state. This innovative book argues that Colbert's practice of collecting knowledge originated in Renaissance Italy, where merchants recognized the power to be gained from merging scholarship and trade. By connecting historical literatures--archives, libraries, merchant techniques, and humanist pedagogy--that have usually remained separate, Soll has created an imaginative and refreshing work.
This text presents a theoretical and practical examination of the latest developments in Information Retrieval and their application to existing systems. By starting with a functional discussion of what is needed for an information system, the reader can grasp the scope of information retrieval problems and discover the tools to resolve them. The book takes a system approach to explore every functional processing step in a system from ingest of an item to be indexed to displaying results, showing how implementation decisions add to the information retrieval goal, and thus providing the user with the needed outcome, while minimizing their resources to obtain those results. The text stresses the current migration of information retrieval from just textual to multimedia, expounding upon multimedia search, retrieval and display, as well as classic and new textual techniques. It also introduces developments in hardware, and more importantly, search architectures, such as those introduced by Google, in order to approach scalability issues. About this textbook: A first course text for advanced level courses, providing a survey of information retrieval system theory and architecture, complete with challenging exercisesApproaches information retrieval from a practical systems view in order for the reader to grasp both scope and solutionsFeatures what is achievable using existing technologies and investigates what deficiencies warrant additional exploration
The third edition of this book will reach across disciplines and address the needs of not only those who study, evaluate, and purchase health information, but also computer and library/information scientists, information technology developers building databases, search engines, Web sites, and other systems for universities and hospitals who enthusiastically read the first two editions. The book is divided into three sections: Basic Concepts, State of the Art and Research Directories. Major changes to the this edition will include a new chapter in the State of the Art section on Digital Libraries and a new focus on areas related to information retrieval systems covering such topics as electronic publishing of journals and other scientific materials, emerging standards, open access publishing issues, digital preservation, that summarize and categorize documents to handle the vast amount of information that is now available. Web updates, which include keeping track of new systems, technologies, studies, are folded into the third edition to show the advancement from 1996 to present time.
This report discusses the information revolution in the Asia-Pacific region and its likely course over the next five to ten years. Key questions addressed in this report include the extent to which the information revolution has taken hold of markets in this region, the political implications of the information revolution for Asian governments, the variations between individual countries, and the prospects for further information-technology-related developments in the region.
Widen the horizon of your Information Security Knowledge!Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. Leaking information to non-authorised people has always been an issue but, in the computer age, the speed and effectiveness with which breaches of information security can occur, and the amount of harm potentially caused are disturbing. Typically, also, they favour the perpetrator, not the victim. The process outlinedThis pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. It provides input for decision making and breach classification, and case studies where the reader can check out how other companies were affected and what they did, or did not do, upon becoming the victim of a breach. Intended to serve two purposes. . . Firstly, this title provides a general discussion of what information security breaches are, how they can be treated, and what ISO27001 offers in that respect, illustrated with details of real-life information security incidents. It aims to serve as a facilitator to widen the horizon of the reader seeking knowledge, or as an introduction for those who arejust starting to think about information security. Secondly, it will form a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction. Here, it will help the reader by identifying, discussing and evaluating treatment options and, through the case studies, it will reduce the tension of the situation readers may find themselves in once abreach occurs. The audienceThis guide is aimed at CSOs, CISOs, IT Security Managers, CIOs and, last but not least, CEOs. It particularly addresses personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to copewith severe incidents.
The changing global economy, together with recent corporate and IT governance developments, all provide the context within which organisations have to assess risks to the information assets on which their organisations, and the delivery of their business plan objectives, depend. Information security management decisions are entirely driven by specific decisions made as an outcome of a risk assessment process in relation to identified risks and specific information assets. Risk assessment is, therefore, the core competence of information security management.
This study guide will help education students to locate, evaluate and make effective use of information, from what appears to be a growing and bewildering variety of sources. Both in and out of university, students are faced with increasingly diverse information choices. This book presents a practical and step-by-step approach to each of the six main skills which underpin information literacy. It also provides appropriate practical and reflective tasks, worked examples and top tips to help education students assess and develop their capacity to use information effectively, particularly in the planning and preparation of their course work.
It is essential for nursing students to access current and reliable information to succeed in academic assignments and nursing practice. Yet there are increasingly diverse information sources available, which can raise questions about the authenticity and reliability of information provided. This book presents a practical and clear guide to mastering information skills. It shows the reader how to effectively plan and implement a search for information, and make judgements on the quality of the sources found. It also gives strategies for storage and retrieval of information, helping nurses to maximise the time they have available for keeping up to date.
A revised and updated text for library science students or as a library selection tool, serving as a critical guide to the secondary literature and an introduction to the pattern of primary literature published in the field of science and technology. It covers all types of reference material, with descriptive and evaluative annotations that define the scope of each work, its intended audience, and special features. Critical comments allow users to compare sources and make choices between similar titles. Paper edition (unseen), $32. Annotation c. by Book News, Inc., Portland, Or.
This volume of Information System Development, Towards a Service Provision Society is the published proceedings of the 17th International Conference on Information Systems Development (ISD2008) that was hosted by the Department of Computer Science of the University of Cyprus at the Annabelle Hotel, Paphos, Cyprus from August 25-27, 2008. The theme of the conference was "Towards a Service Provision Society". In total, 131 delegates from 34 different countries registered for the conference, making it a truly international event. Papers presented at the conference strongly reflected the conference theme. Of 165 papers submitted, 99 were presented at the conference, representing an acceptance rate of approximately 60%. All papers were peer reviewed by three or four referees (a total of 543 review reports were submitted, corresponding to an average of 3.29 reviews per paper). Over the course of three days, 28 paper sessions were held, covering a range of areas such as: "Information Systems Engineering & Management", "Business Systems Analysis & Design", "Intelligent Information Systems", "Agile and High-Speed Systems Development Methods", "Enterprise Systems Development & Adoption", "Public Information Systems Development", "Information Systems Development Education", "Information Systems Development in Developing Nations", "Legal and Administrative Aspects of Information Systems Development", "Information Systems Research Methodologies", "Service-Oriented Analysis and Design of Information Systems", "IT Service Management", "Philosophical and Theoretical Issues in Information Systems Development", "Model-driven Engineering in ISD", "Human Computer Interaction (HCI) in Information Systems Development". The book is organised by order of the conference sessions. While all the presented papers were of high quality, we have selected two of them to share the Best Paper Award. The first one is: "Modeling the contribution of enterprise architecture practice to the achievement of business goals" by Marlies van Steenbergen & Sjaak Brinkkemper. The second one is: "Why can't we bet on ISD Outcomes?: ISD "Form" as a Predictor of Success" by Mike Newman, Shan L Pan & Gary Pan. Furthermore, to acknowledge the quality of the reviews he completed, the quality of the paper he submitted, his role as a track and session chair, and his general participation in the conference, we have awarded an Ovreall Contribution Award to Michael Lang of the National University of Ireland, Galway. Details of these awards can be found on the conference Web site at http://isd2008.cs.ucy.ac.cy. Our gratitude is extended firstly to all those who attended and authored work for the conference. The contribution of the International Program Committee was invaluable in identifying track chairs and reviewers to commit to doing vital work. While volunteering to host a conference is a highly personal undertaking, without support it would be impossible. Thus, we wish to thank our sponsors for their financial support and other aid. The ISD conference community has developed over the years a real sense of collegiality and friendliness, perhaps unusually so for a conference. At the same time it has been a stimulating forum where a free exchange of views and perspectives is encouraged. Perhaps what brings the community together is a belief that the process of systems development is important; whether it is systematic or structured or improvised or spontaneous, there is something about the process and the outcomes that excites us. We form a spectrum of thought from those who see the activity as somewhat scientific to others that see it as wholly sociological; we span a divide between abstract and conceptual, to hard code and artefacts - somewhere in-between lies the truth. If our work is to make a meaningful contribution to both practice (by teaching students) and research (by sharing our experiences and studies with others), then hopefully this conference will have done a little of the former and much for the latter.
Information Systems: A Manager's Guide to Harnessing Technology V 1.4 is intended for use in undergraduate and/or graduate courses in Management Information Systems and Information Technology. Version 1.4 of John's book retains the same structure and theory of the earlier versions, but Version 1.4 updates key statistics and examples, and includes up-to-date case material, such as Pinterest and Facebook's Instagram acquisition. Adopting version 1.4 guarantees your students will have the most current text on the market, drawing real and applicable lessons from material that will keep your class offerings current and accessible.
The overall mission of this book is to provide a comprehensive understanding and coverage of the various theories and models used in IS research. Specifically, it aims to focus on the following key objectives: To describe the various theories and models applicable to studying IS/IT management issues. To outline and describe, for each of the various theories and models, independent and dependent constructs, reference discipline/originating area, originating author(s), seminal articles, level of analysis (i.e. firm, individual, industry) and links with other theories. To provide a critical review/meta-analysis of IS/IT management articles that have used a particular theory/model.To discuss how a theory can be used to better understand how information systems can be effectively deployed in today's digital world. This book contributes to our understanding of a number of theories and models. The theoretical contribution of this book is that it analyzes and synthesizes the relevant literature in order to enhance knowledge of IS theories and models from various perspectives. To cater to the information needs of a diverse spectrum of readers, this book is structured into two volumes, with each volume further broken down into two sections. The first section of Volume 1 presents detailed descriptions of a set of theories centered around the IS lifecycle, including the Success Model, Technology Acceptance Model, User Resistance Theories, and four others. The second section of Volume 1 contains strategic and economic theories, including a Resource-Based View, Theory of Slack Resources, Portfolio Theory, Discrepancy Theory Models, and eleven others. The first section of Volume 2 concerns socio-psychological theories. These include Personal Construct Theory, Psychological Ownership, Transactive Memory, Language-Action Approach, and nine others. The second section of Volume 2 deals with methodological theories, including Critical Realism, Grounded Theory, Narrative Inquiry, Work System Method, and four others. Together, these theories provide a rich tapestry of knowledge around the use of theory in IS research. Since most of these theories are from contributing disciplines, they provide a window into the world of external thought leadership.
Information Technology and Product Development: A Research Agenda presents important new research from varied disciplines aimed at developing new theoretical concepts and insights on the application of IT in product and service innovation. Drawing on the work of researchers in such varied management areas as information services, technology management, marketing, operations, business strategy and organizational behavior, the book redefines the role of IT in product and service development and the organizational and management issues underlying the successful deployment of IT in innovation contexts, and provides a foundation for future research on the diverse types of IT applications in product development and their potential impact on both product and service innovation. Reflecting two critical shifts in the service sector - the increased complexity and convergence in products and services, along with the rise of the Internet and rapid digitization of products and services - the book is organized into three sections. Section 1 presents four chapters that focus on the traditional areas of project and process management; Section 2 presents four chapters focusing on the emerging areas of collaborative innovation and knowledge co-creation; and Section 3 presents one chapter that draws it all together and identifies some of the important themes and issues for future research. This important new work has much to offer academic researchers in management in its in-depth theoretical analysis of the wide range of organizational and management issues associated with the application of IT in product and service development. It will also appeal to researchers and thought-leaders in consulting organizations whose primary area of interest is product development or IT applications.
The purpose of this book is to be the premier resource for behavioural health clinicians who are considering adopting technology into their practice. Written by experts and policy makers in the field this book will be recognized as the gold standard. Other books currently in this field are extremely technical and are geared primarily to policy makers, researchers and informaticians. While this book will be a useful adjunct to that audience, it is primarily designed for the over .5 million behavioural health clinicians in the U.S. and the millions others around the world. Adoption of technology is slow in behavioural healthcare, and this book will enhance the adoption and utilization of various technologies in practice. I.T. vendors may also purchase this book for their customers.
IT in Pharmacy: An Integrated Approach aims to describe and discuss the major areas of pharmacy IT innovation (e-prescribing, drug databases, electronic patient records, clinical decision support, pharmacy management systems, robots and automation etc) from a systems and a professional perspective. It will also consider how the areas of pharmacy IT link together and can be used to enable and develop pharmacy professional practice. The book will examine pharmacy IT from an international perspective, taking into account all parts of the world where IT systems are used in pharmacy practice - namely - North America, the UK, Western Europe and Australia - and will compare pharmacy IT in the different regions. This book is from the author of Principles of Electronic Prescribing (Springer, 2008)
Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.See and hear words read aloud
- DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
- DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
- Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
- DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
- MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
- BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
- DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
- Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.