Browse Results

Showing 34,026 through 34,050 of 55,712 results

Information Security and Privacy: 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I (Lecture Notes in Computer Science #9722)

by Joseph K. Liu Ron Steinfeld

The two-volume set LNCS 9722 and LNCS 9723 constitutes the refereed proceedings of the 21st Australasian Conference on Information Security and Privacy, ACISP 2016, held in Melbourne, VIC, Australia, in July 2016. The 52 revised full and 8 short papers presented together with 6 invited papers in this double volume were carefully revised and selected from 176 submissions. The papers of Part I (LNCS 9722) are organized in topical sections on National Security Infrastructure; Social Network Security; Bitcoin Security; Statistical Privacy; Network Security; Smart City Security; Digital Forensics; Lightweight Security; Secure Batch Processing; Pseudo Random/One-Way Function; Cloud Storage Security; Password/QR Code Security; and Functional Encryption and Attribute-Based Cryptosystem. Part II (LNCS 9723) comprises topics such as Signature and Key Management; Public Key and Identity-Based Encryption; Searchable Encryption; Broadcast Encryption; Mathematical Primitives; Symmetric Cipher; Public Key and Identity-Based Encryption; Biometric Security; Digital Forensics; National Security Infrastructure; Mobile Security; Network Security; and Pseudo Random/One-Way Function.

Information Security Applications

by Dooho Choi Ho-Won Kim

This book constitutes the thoroughly refereedpost-workshop proceedings of the 16th International Workshop on InformationSecurity Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume werecarefully reviewed and selected from 78 submissions. The papers are organizedin topical sections such as hardware security; cryptography, side channelattacks and countermeasures; security and threat analysis; IoT security;network security; cryptography; application security.

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

by Douglas J. Landoll

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Information Security Theory and Practice

by Sara Foresti Javier Lopez

This volume constitutes the refereed proceedings of the 10th IFIP WG 11. 2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Information Systems: A Manager's Guide to Harnessing Technology, v. 5.0

by John Gallaugher

WHAT'S NEW IN 5.0:<P><P> FRESHLY UPDATED:<P> Every chapter has received an update to ensure that it covers the latest topics and material. Today’s cutting edge firms and headline grabbing topics are presented through durable frameworks and concepts.<P> WORLDWIDE TRENDS IN TECH DEVELOPMENTS:<P> Included are updates and statistics on companies and technologies being developed around the world. China started the century as a nation largely unplugged and offline, but now has more internet users than any other country. In Sub-Saharan Africa, 70% of the population lives within mobile cell phone coverage. Now, even drones are affordable enough to be used as a delivery system in places with poor infrastructure.<P> PROTEUS, A PILL CAMERA:<P> A mini-case in the “Moore’s Law and More” chapter discusses the launch of Proteus’s low cost and efficient “PillCam.” Using small sensors and powered by digestive acids, the pill allows doctors to see a unique perspective inside the human body (literally).<P> SOCIAL MEDIA POWERHOUSE:<P> Statistics on the massive amount of new social networks and acquisitions in the marketplace have all been updated. New content includes Microsoft’s acquisition of LinkedIn, Slack’s dominant presence in the business space, and the rise of companies like HubSpot. New subsections discuss Twitter and the rise of microblogging, as well as Facebook’s dominant news feed and its strong position against Google’s advertising monopoly.<P> CUTTING EDGE COVERAGE:<P> From Facebook’s move to make Messenger a platform to Google’s evolution to Alphabet, students will feel their text and classroom are alive with the most current content available.<P> For a comprehensive list of what's new in version 5.0, visit Gallaugher’s blog.<P> John Gallaugher of Boston College has been named one of Entrepreneur Magazine’s “Gurus to Grads.” His popular and award-winning textbook offers a proven approach that has garnered student praise and increased information systems enrollment. Each year Gallaugher meets with scores of tech industry executives from Silicon Valley to sub-Saharan Africa, and there is no other Information Systems author today who keeps his text as "up-to-the-month" current. <P> For regular updates, follow Gallaugher’s blog, The Week in Geek, and connect with him on Twitter at @gallaugher.<P> This textbook is suitable for these courses:Undergraduate or graduate courses in Management Information Systems and Information Technology<P> This textbook is suitable for 2 and 4 year institutions.<P> PEDAGOGICAL FEATURES:<P> FOCUS ON STRATEGIC THINKING:<P> Rather than lead with technical topics, the book starts with strategic thinking, focusing on big-picture issues that have confounded experts but will engage students.<P> CURRENT, ENGAGING AND HOLISTIC CASE STUDIES:<P> While chapters introduce concepts, cases on approachable, exciting firms across industries further challenge students to apply what they've learned. Students love how concepts are introduced in a text that reads more like Wired and the Wall Street Journal than a conventional textbook.<P> CONCEPTS:<P> Chapters cover not only strategy and technology basics, but critical and cutting edge concepts such as data analytics, security, social media, the sharing economy, disruptive innovation, network effects and platform creation, open source, and cloud computing.<P> FASCINATING FIRMS:<P> In-depth profiles include firms that students know and are eager to learn more about. Amazon, Facebook, Google, Netflix, Rent the Runway, and Zara are among the firms that get extended coverage, along with mini-cases on Airbnb, Uber, and more.<P> CUSTOMIZABILITY:<P> The Flat World Knowledge publishing model allows instructors to adapt the textbook to the exact needs of their specific class and student body. See how easy it is to customize a textbook in this 4 minute demo: Flat World Editing Platform Video Demo

Information Systems: Development, Research, Applications, Education

by Stanislaw Wrycza

This book constitutes the refereed proceedings of the SIGSAND/PLAIS EuroSymposium 2016 titled Information Systems: Development, Research, Applications, Education, held in Gdansk and Sopot, Poland, on September 29, 2016. The objective of this symposium is to promote and develop high-quality research on all issues related to systems analysis and design (SAND). It provides a forum for SAND researchers and practitioners in Europe and beyond to interact, collaborate, and develop their field. The 14 papers presented in this volume were carefully reviewed and selected from 34 submissions. They are organized in topical sections on information systems development, information systems management, and information systems learning.

Information Systems: What Every Business Student Needs to Know (Chapman & Hall/CRC Textbooks in Computing)

by Efrem G. Mallach

Most information systems (IS) texts overwhelm business students with overly technical information they may not need in their careers. This textbook takes a new approach to the required IS course for business majors. For each topic covered, the text highlights key "Take-Aways" that alert students to material they will need to remember during their careers. Sections titled "Where You Fit In" and "Why This Chapter Matters" explain how the topics being covered will impact students once they are on the job. Review questions, discussion questions, and summaries are included in each chapter.

Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology - ISAT 2015 - Part III

by Zofia Wilimowska Adam Grzech Leszek Borzemski Jerzy Świątek

This fourvolume set of books constitutes the proceedings of the 36th InternationalConference Information Systems Architecture and Technology 2015, or ISAT 2015for short, held on September 20-22, 2015 in Karpacz, Poland. The conference wasorganized by the Computer Science and Management Systems Departments, Facultyof Computer Science and Management, Wroclaw University of Technology, Poland. The papers included in the proceedings have been subject to a thorough reviewprocess by highly qualified peer reviewers. The accepted papers have beengrouped into four parts: Part I--addressing topics including,but not limited to, systems analysis and modeling, methods for managing complexplanning environment and insights from Big Data research projects. Part II--discoursing about topicsincluding, but not limited to, Web systems, computer networks, distributedcomputing, and multi-agent systems and Internet of Things. Part III--discussing topics including,but not limited to, mobile and Service Oriented Architecture systems, highperformance computing, cloud computing, knowledge discovery, data mining andknowledge based management. Part IV--dealing with topicsincluding, but not limited to, finance, logistics and market problems, andartificial intelligence methods.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part I

by Leszek Borzemski Adam Grzech Jerzy Świątek Zofia Wilimowska

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and mulit-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology – ISAT 2016 – Part IV

by Zofia Wilimowska Leszek Borzemski Adam Grzech Jerzy Świątek

This four volume set of books constitutes the proceedings of the 2016 37th International Conference Information Systems Architecture and Technology (ISAT), or ISAT 2016 for short, held on September 18-20, 2016 in Karpacz, Poland. The conference was organized by the Department of Management Systems and the Department of Computer Science, Wrocław University of Science and Technology, Poland. The papers included in the proceedings have been subject to a thorough review process by highly qualified peer reviewers. The accepted papers have been grouped into four parts: Part I--addressing topics including, but not limited to, systems analysis and modeling, methods for managing complex planning environment and insights from Big Data research projects. Part II--discoursing about topics including, but not limited to, Web systems, computer networks, distributed computing, and multi-agent systems and Internet of Things. Part III--discussing topics including, but not limited to, mobile and Service Oriented Architecture systems, high performance computing, cloud computing, knowledge discovery, data mining and knowledge based management. Part IV--dealing with topics including, but not limited to, finance, logistics and market problems, and artificial intelligence methods.

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 1

by Suresh Chandra Satapathy Jyotsna Kumar Mandal Siba K. Udgata Vikrant Bhateja

Thethird international conference on INformation Systems Design and IntelligentApplications (INDIA - 2016) held in Vishakhapatnam, India during January 8-9,2016. The book covers all aspects of information system design, computerscience and technology, general sciences, and educational research. Upon adouble blind review process, a number of high quality papers are selected andcollected in the book, which is composed of three different volumes, and coversa variety of topics, including natural language processing, artificialintelligence, security and privacy, communications, wireless and sensornetworks, microelectronics, circuit and systems, machine learning, softcomputing, mobile computing and applications, cloud computing, software engineering,graphics and image processing, rural engineering, e-commerce, e-governance,business computing, molecular computing, nano-computing, chemical computing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist.

Information Systems Design and Intelligent Applications

by Suresh Chandra Satapathy Jyotsna Kumar Mandal Siba K. Udgata Vikrant Bhateja

Thethird international conference on INformation Systems Design and IntelligentApplications (INDIA - 2016) held in Visakhapatnam, India during January 8-9,2016. The book covers all aspects of information system design, computerscience and technology, general sciences, and educational research. Upon adouble blind review process, a number of high quality papers are selected andcollected in the book, which is composed of three different volumes, and coversa variety of topics, including natural language processing, artificialintelligence, security and privacy, communications, wireless and sensornetworks, microelectronics, circuit and systems, machine learning, softcomputing, mobile computing and applications, cloud computing, software engineering,graphics and image processing, rural engineering, e-commerce, e-governance,business computing, molecular computing, nano-computing, chemical computing,intelligent computing for GIS and remote sensing, bio-informatics andbio-computing. These fields are not only limited to computer researchers butalso include mathematics, chemistry, biology, bio-chemistry, engineering,statistics, and all others in which computer techniques may assist.

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 2 (Advances in Intelligent Systems and Computing #434)

by Suresh Chandra Satapathy Jyotsna Kumar Mandal Siba K. Udgata Vikrant Bhateja

The third international conference on INformation Systems Design and Intelligent Applications (INDIA – 2016) held in Visakhapatnam, India during January 8-9, 2016. The book covers all aspects of information system design, computer science and technology, general sciences, and educational research. Upon a double blind review process, a number of high quality papers are selected and collected in the book, which is composed of three different volumes, and covers a variety of topics, including natural language processing, artificial intelligence, security and privacy, communications, wireless and sensor networks, microelectronics, circuit and systems, machine learning, soft computing, mobile computing and applications, cloud computing, software engineering, graphics and image processing, rural engineering, e-commerce, e-governance, business computing, molecular computing, nano-computing, chemical computing, intelligent computing for GIS and remote sensing, bio-informatics and bio-computing. These fields are not only limited to computer researchers but also include mathematics, chemistry, biology, bio-chemistry, engineering, statistics, and all others in which computer techniques may assist.

Information Systems for Crisis Response and Management in Mediterranean Countries

by Paloma Díaz Narjès Bellamine Ben Saoud Julie Dugdale Chihab Hanachi

This book constitutes the refereed proceedings of the Third International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries, ISCRAM-med 2016, held in Madrid, Spain, in October 2016. Information systems and technologies can play a key role in crisis management in order to support preparation, response, mitigation and recovery processes. Yet technology is not enough to guarantee a better management process, and therefore the conference does not only focus on engineering technologies, but also on their application and practical experiences. The 12 full and 8 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They are organized in topical sections on mobile apps for citizens, modeling and simulation, development of information systems, information and knowledge management, collaboration and coordination, social computing, and issues in humanitarian crisis.

Information Systems for Crisis Response and Management in Mediterranean Countries: Third International Conference, ISCRAM-med 2016, Madrid, Spain, October 26-28, 2016, Proceedings (Lecture Notes in Business Information Processing #265)

by Paloma Díaz, Narjès Bellamine Ben Saoud, Julie Dugdale and Chihab Hanachi

This book constitutes the refereed proceedings of the Third International Conference on Information Systems for Crisis Response and Management in Mediterranean Countries, ISCRAM-med 2016, held in Madrid, Spain, in October 2016. Information systems and technologies can play a key role in crisis management in order to support preparation, response, mitigation and recovery processes. Yet technology is not enough to guarantee a better management process, and therefore the conference does not only focus on engineering technologies, but also on their application and practical experiences. The 12 full and 8 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They are organized in topical sections on mobile apps for citizens, modeling and simulation, development of information systems, information and knowledge management, collaboration and coordination, social computing, and issues in humanitarian crisis.

Information Systems Security

by Indrajit Ray Manoj Singh Gaur Mauro Conti Dheeraj Sanghi V. Kamakoti

This book constitutes the refereed proceedings of the 12th International Conference on Information Systems Security, ICISS 2016, held in Jaipur, India, in December 2016. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 196 submissions. The papers address the following topics: attacks and mitigation; authentication; authorization and information flow control; crypto systems and protocols; network security and intrusion detection; privacy; software security; and wireless, mobile and IoT security.

Information Technology for Management

by Ewa Ziemba

This book constitutes revised and extended versions of the best papers from the 10th Conference on Information Systems Management (ISM 2015) and 13th Conference on Advanced Information Technologies for Management (AITM 2015), held in Lodz, Poland, September 2015 as part of the Federated Conference on Computer Science and Information Systems (FedCSIS 2015). These events constitute a forum for the exchange of ideas for practitioners and theorists working in the broad area of information systems management in organizations and to present and discuss the current issues of IT in business applications. The 11 full papers included in this volume were carefully reviewed and selected originally 54 submissions. They focus on knowledge management systems; information technology for business and public organizations; and evaluation of information systems.

Information Technology for Management. Ongoing Research and Development: 15th Conference, Aitm 2017, And 12th Conference, Ism 2017, Held As Part Of Fedcsis, Prague, Czech Republic, September 3-6, 2017, Extended Selected Papers (Lecture Notes In Business Information Processing #311)

by Ewa Ziemba

This book constitutes extended selected papers from the 15th Conference on Advanced Information Technologies for Management, AITM 2017, and the 12th Conference on Information Systems Management, ISM 2017, held as part of the Federated Conference on Computer Science and Information Systems, FedCSIS, which took place in Prague, Poland, in September 2017. The 13 papers presented in this volume were carefully reviewed and selected from 48 submissions. They were organized in topical sections named: information technology and systems for knowledge management; information technology and systems for business transformation; and implementation and evaluation of information systems.

Information Technology in Environmental Engineering

by Jorge Marx Gómez Brenda Scholtz

This book presents new concepts as well as practical applications and experiences in the field of information technology for environmental engineering. The book has three main focus areas: firstly, it shows how information technologies can be employed to support natural resource management and conservation, environmental engineering, scientific simulation and integrated assessment studies. Secondly, it demonstrates the application of computing in the everyday practices of environmental engineers, natural scientists, economists and social scientists. And thirdly, it demonstrates how the complexity of natural phenomena can be approached using interdisciplinary methods, where computer science offers the infrastructure needed for environmental data collection and management, scientific simulations, decision support documentation and reporting. The book collects selected papers presented at the 7th International Symposium on Environmental Engineering, held in Port Elizabeth, South Africa in July 2015. It discusses recent success stories in eco-informatics, promising ideas and new challenges from the interdisciplinary viewpoints of computer scientists, environmental engineers, economists and social scientists, demonstrating new paradigms for problem-solving and decision-making.

Information Theoretic Security

by Anderson C.A. Nascimento Paulo Barreto

This book constitutes the thoroughly refereed proceedings fo the 9th International Conference on Information Theoretic Security, ICITS 2016, held in Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy.

Infostorms: Why do we 'like'? Explaining individual behavior on the social net, 2nd Edition

by Vincent F. Hendricks Pelle G. Hansen

With points of departure in philosophy, logic, social psychology, economics, and choice and game theory, Infostorms shows how information may be used to improve the quality of personal decision and group thinking but also warns against the informational pitfalls which modern information technology may amplify: From science to reality culture and what it really is, that makes you buy a book like this.<P><P> The information society is upon us. New technologies have given us back pocket libraries, online discussion forums, blogs, crowdbased opinion aggregators, social media and breaking news wherever, whenever. But are we more enlightened and rational because of it? <P> Infostorms provides the nuts and bolts of how irrational group behaviour may get amplified by social media and information technology. If we could be collectively dense before, now we can do it at light speed and with potentially global reach. That’s how things go viral, that is how cyberbullying, rude comments online, opinion bubbles, status bubbles, political polarisation and a host of other everyday unpleasantries start. Infostorms will give the story of the mechanics of these phenomena. This will help you to avoid them if you want or learn to start them if you must. It will allow you to stay sane in an insane world of information.

Infrastructure as Code: Managing Servers in the Cloud

by Kief Morris

Virtualization, cloud, containers, server automation, and software-defined networking are meant to simplify IT operations. But many organizations adopting these technologies have found that it only leads to a faster-growing sprawl of unmanageable systems. This is where infrastructure as code can help. With this practical guide, author Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered through the DevOps movement to manage cloud age infrastructure.Ideal for system administrators, infrastructure engineers, team leads, and architects, this book demonstrates various tools, techniques, and patterns you can use to implement infrastructure as code. In three parts, you'll learn about the platforms and tooling involved in creating and configuring infrastructure elements, patterns for using these tools, and practices for making infrastructure as code work in your environment.Examine the pitfalls that organizations fall into when adopting the new generation of infrastructure technologiesUnderstand the capabilities and service models of dynamic infrastructure platformsLearn about tools that provide, provision, and configure core infrastructure resourcesExplore services and tools for managing a dynamic infrastructureLearn specific patterns and practices for provisioning servers, building server templates, and updating running servers

The Inner Workings of Life

by Eberhard O. Voit

Living systems are dynamic and extremely complex and their behaviour is often hard to predict by studying their individual parts. Systems biology promises to reveal and analyse these highly connected, regulated and adaptable systems, using mathematical modelling and computational analysis. This new systems approach is already having a broad impact on biological research and has potentially far-reaching implications for our understanding of life. Written in an informal and non-technical style, this book provides an accessible introduction to systems biology. Self-contained vignettes each convey a key theme and are intended to enlighten, provoke and interest readers of different academic disciplines, but also to offer new insight to those working in the field. Using a minimum amount of jargon and no mathematics, Voit manages to convey complex ideas and give the reader a genuine sense of the excitement that systems biology brings with it, as well as the current challenges and opportunities.

Innovating with Concept Mapping

by Alberto Cañas Priit Reiska Joseph Novak

This book constitutes the refereed proceedings of the 7th International Conference on Concept Mapping, CMC 2016, held in Tallinn, Estonia, in September 2016. The 25 revised full papers presented were carefully reviewed and selected from 135 submissions. The papers address issues such as facilitation of learning; eliciting, capturing, archiving, and using expert knowledge; planning instruction; assessment of deep understandings; research planning; collaborative knowledge modeling; creation of knowledge portfolios; curriculum design; eLearning, and administrative and strategic planning and monitoring. "

Innovation in China: The Chinese Software Industry (Routledge Contemporary China Series)

by Shang-Ling Jui

A key question for China, which has for some time been a leading global manufacturing base, is whether China can progress from being a traditional centre of manufacturing to becoming a centre for innovation. In this book, Shang-Ling Jui focuses on China’s software industry and examines the complete innovation value chain of software in its key phases of innovation, standards definition, development and marketing. He argues that, except for software development, these key phases are of high added-value and that without adopting the concept of independent innovation as a guiding ideology, China’s software enterprises – like India’s – would have an uncertain future. In other words, the lack of core competence in the development of China’s software industry might restrain the industry from taking the leading position and drive it towards becoming no more than the software workshop of multinationals over the long term. Shang-Ling Jui contends that China’s software industry should and can possess its own complete innovation value chain. Having worked in China’s software industry for many years, the author provides an inside-out perspective – identifying the strengths and weaknesses of the industry and defining the challenges in China’s transition from "Made in China" to "Innovated in China."

Refine Search

Showing 34,026 through 34,050 of 55,712 results