Browse Results

Showing 44,851 through 44,875 of 59,366 results

Printed Antennas for 5G Networks (PoliTO Springer Series)

by Ladislau Matekovits Binod Kumar Kanaujia Jugul Kishor Surendra Kumar Gupta

The book provides a comprehensive overview of antennas for 5G technology, such as MIMO, multiband antennas, Magneto-Electric Dipole Antenna and PIFA Antenna for 5G networks, phased array antennas for 5G access, beam-forming and beam-steering issues, 5G antennas for specific applications (smartphone, cognitive radio) and advance antenna concept and materials for 5G. The book also covers ooptimizations methods for passive and active devices in mm-Wave 5G networks. It explores topics which influence the design and characterization of antennas such as data rates, high isolation, pattern and spatial diversity, making 5G antennas more suitable for a multipath environment. The book represents a learning tool for researchers in the field, and enables engineers, designers and manufacturers to identify key design challenges of antennas for 5G networks, and characterize novel antennas for 5G networks.

Printing with Adobe Photoshop CS4

by Tim Daly

Photoshop users:Ever feel like your printer is letting you down? Sick of seeing the bright, saturated tones of photos on your monitor turn into washed-out, drab prints? Frustrated by the lack of resources on this essential process?If the answer to any of these questions is yes, then you really need "The Complete Guide to Digital Printing" by Tim Daly. This essential resource is the only guide you'll ever need to printing with Photoshop. Acclaimed author and photographer Tim Daly brings a wealth of experience to this under-resourced topic, covering every aspect of the printing process using Photoshop. Not content with simply covering the software, Tim approaches the entire workflow. This means that right from the moment of capture, your photos are optimised for the highest print quality from Photoshop. Topics covered include image capture and management, file processing, creative emphasis, proofing, Photoshop print functions, color management (both input and output), printer hardware and software, and, of course, the actual printing. Buy this book, and see an immediate difference to the quality of your prints. Authoritative, practical and comprehensive, this is a must-have for every photographer using Photoshop.

Printreading for Residential Construction, Sixth Edition

by Thomas E. Proctor Leonard P. Toenjes

Printreading for Residential Constructionpresents printreading fundamentals and provides printreading activities related to residential construction. Topics presented include sketching, computer-aided design (CAD), trade math symbols and abbreviations, plot plans, floor plans, elevations, sections, and details. This new edition provides information on revised building codes, LEED for Homes, green building practices, advanced house framing techniques, insulation, and the whole-house systems approach. Content Overview Construction Documents Working Drawing Concepts Trade Math Symbols and Abbreviations Plot Plans Floor Plans Elevations Sections Details Trade Information - Foundations, Framing, and Finishes Trade Information - Electrical, Plumbing, and HVAC Final Review and Exams Appendix Glossary Index

Priority-Zone Mapping for Reforestation: Case Study in the Montane Dry Forests of Bolivia (SpringerBriefs in Geography)

by Larissa Böhrkircher Michael Leuchner Fabio Bayro Kaiser Christa Reicher

Andean dry forest ecosystems are threatened by deforestation and unsustainable land use methods. The negative effects for the livelihood of the local population, biodiversity, and the regional climate could be countered by reforestation measures; however, dry land forests have not attracted the same level of interest and investment like other ecosystems. This book describes the development of a priority-zone map for reforestation measures, showing where reforestation might have the greatest social and ecological benefits. To achieve this, a problem analysis of a case study region is conducted and thematic reforestation benefits are determined. Using remote sensing and GIS, the areas where benefits can be obtained are mapped in individual layers and compiled into a summarizing priority-zone map. It is thus possible to identify areas where reforestation would achieve multiple benefits. The concept of priority maps could be used to facilitate reforestation strategies by local communities and municipal governments and could thus contribute to initiate an integrated forest and landscape restoration of the Bolivian montane dry forests.

Privacidad es poder: Datos, vigilancia y libertad en la era digital

by Carissa Véliz

Seleccionado por The Economist como uno de los libros del año. La guía definitiva para afrontar uno de los problemas más acuciantes de nuestro tiempo: la pérdida de la privacidad. Nos vigilan. Saben que estás leyendo estas palabras. Gobiernos y cientos de empresas nos espían: a ti y a todos tus conocidos. A todas horas, todos los días. Rastrean y registran todo lo que pueden: nuestra ubicación, nuestras comunicaciones, nuestras búsquedas en internet, nuestra información biométrica, nuestras relaciones sociales, nuestras compras, nuestros problemas médicos y mucho más. Quieren saber quiénes somos, qué pensamos, dónde nos duele. Quieren predecir nuestro comportamiento e influir en él. Tienen demasiado poder. Su poder proviene de nosotros, de ti, de tus datos. Recuperar la privacidad es la única manera de que podamos asumir de nuevo el mando de nuestras vidas y de nuestras sociedades. La privacidad es tan colectiva como personal, y es hora de retomar el control. Privacidad es poder es el primer libro que propone el fin de la economía de los datos. Carissa Véliz explica cómo nuestros datos personales están cediendo demasiado poder a las grandes empresas tecnológicas y a los gobiernos, por qué esto es importante y qué podemos hacer al respecto.

Privacy and Anonymity in Information Management Systems

by Jordi Nin Javier Herranz

The development of information technologies in the last few years has been remarkable. Large amounts of data are collected and stored by both public institutions and private companies every day. There are clear threats to the privacy of citizens if no care is taken when collecting, storing and disseminating data. Ensuring privacy for individuals in a society when dealing with digital information, is a task which involves many agents, including politicians, legal authorities, managers, developers, and system administrators. Privacy and Anonymity in Information Management Systems deals with the more technical parts of this `privacy cycle', those issues that are mostly related to computer science, and discusses the process by which different privacy mechanisms are motivated, designed, analyzed, tested and finally implemented in companies or institutions. The book is written in such a way that several of the chapters are self-contained and accessible to students, covering topics such as the problem of Statistical Disclosure Control (SDC), i.e. how to modify datasets that contain statistical information before publicly releasing them, and doing so in such a way that the privacy of the confidential original information is preserved; and specific distributed applications involving privacy - how different agents have private inputs but want to cooperate to run some protocol in their own interest, without revealing unnecessary parts of their private inputs. Graduate students and researchers will find this book an excellent resource.

Privacy and Big Data: The Players, Regulators, and Stakeholders

by Terence Craig Mary E. Ludloff

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once data's been collected, we have absolutely no control over who uses it or how it is used.Personal data is the hottest commodity on the market today—truly more valuable than gold. We are the asset that every company, industry, non-profit, and government wants. Privacy and Big Data introduces you to the players in the personal data game, and explains the stark differences in how the U.S., Europe, and the rest of the world approach the privacy issue.You'll learn about:Collectors: social networking titans that collect, share, and sell user dataUsers: marketing organizations, government agencies, and many othersData markets: companies that aggregate and sell datasets to anyoneRegulators: governments with one policy for commercial data use, and another for providing security

Privacy and Capitalism in the Age of Social Media (Routledge Research in Information Technology and Society #18)

by Sebastian Sevignani

This book explores commodification processes of personal data and provides a critical framing of the ongoing debate of privacy in the Internet age, using the example of social media and referring to interviews with users. It advocates and expands upon two main theses: First, people’s privacy is structurally invaded in contemporary informational capitalism. Second, the best response to this problem is not accomplished by invoking the privacy framework as it stands, because it is itself part of the problematic nexus that it struggles against. Informational capitalism poses weighty problems for making the Internet a truly social medium, and aspiring to sustainable privacy simultaneously means to struggle against alienation and exploitation. In the last instance, this means opposing the capitalist form of association – online and offline.

Privacy and Data Protection Challenges in the Distributed Era (Learning and Analytics in Intelligent Systems #26)

by Eugenia Politou Efthimios Alepis Maria Virvou Constantinos Patsakis

This book examines the conflicts arising from the implementation of privacy principles enshrined in the GDPR, and most particularly of the ``Right to be Forgotten'', on a wide range of contemporary organizational processes, business practices, and emerging computing platforms and decentralized technologies. Among others, we study two ground-breaking innovations of our distributed era: the ubiquitous mobile computing and the decentralized p2p networks such as the blockchain and the IPFS, and we explore their risks to privacy in relation to the principles stipulated by the GDPR. In that context, we identify major inconsistencies between these state-of-the-art technologies with the GDPR and we propose efficient solutions to mitigate their conflicts while safeguarding the privacy and data protection rights. Last but not least, we analyse the security and privacy challenges arising from the COVID-19 pandemic during which digital technologies are extensively utilized to surveil people’s lives.

Privacy and Data Protection in Software Services (Services and Business Process Reengineering)

by Roberto Senigaglia Claudia Irti Alessandro Bernes

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal rules should be bound together for moulding a special ‘toolbox’ to solve present and future issues. The volume is intended to contribute to this ‘toolbox’ in the area of software services, while addressing how to make legal studies work closely with engineers’ and computer scientists’ fields of expertise, who are increasingly involved in tangled choices on daily programming and software development. In this respect, law has not lost its importance and its own categories in the digital world, but as well as any social science needs to experience a new realistic approach amid technological development and individuals’ fundamental rights and freedoms.

Privacy and Data Protection Issues of Biometric Applications

by Els J. Kindt

This book discusses all critical privacy and data protection aspects of biometric systems from a legal perspective. It contains a systematic and complete analysis of the many issues raised by these systems based on examples worldwide and provides several recommendations for a transnational regulatory framework. An appropriate legal framework is in most countries not yet in place. Biometric systems use facial images, fingerprints, iris and/or voice in an automated way to identify or to verify (identity) claims of persons. The treatise which has an interdisciplinary approach starts with explaining the functioning of biometric systems in general terms for non-specialists. It continues with a description of the legal nature of biometric data and makes a comparison with DNA and biological material and the regulation thereof. After describing the risks, the work further reviews the opinions of data protection authorities in relation to biometric systems and current and future (EU) law. A detailed legal comparative analysis is made of the situation in Belgium, France and the Netherlands. The author concludes with an evaluation of the proportionality principle and the application of data protection law to biometric data processing operations, mainly in the private sector. Pleading for more safeguards in legislation, the author makes several suggestions for a regulatory framework aiming at reducing the risks of biometric systems. They include limitations to the collection and storage of biometric data as well as technical measures, which could influence the proportionality of the processing. The text is supported by several figures and tables providing a summary of particular points of the discussion. The book also uses the 2012 biometric vocabulary adopted by ISO and contains an extensive bibliography and literature sources.

Privacy and Data Protection Seals (Information Technology and Law Series #28)

by Rowena Rodrigues Vagelis Papakonstantinou

The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, and societal perspectives. It covers data protection certification in the EU (i.e., the possibilities, actors and building blocks); the Schleswig-Holstein Data Protection Seal; the French Privacy Seal Scheme; privacy seals in the USA, Europe, Japan, Canada, India and Australia; controversies, challenges and lessons for privacy seals; the potential for privacy seals in emerging technologies; and an economic analysis. This book is particularly relevant in the EU context, given the General Data Protection Regulation (GDPR) impetus to data protection certification mechanisms and the dedication of specific provisions to certification. Its coverage of practices in jurisdictions outside the EU also makes it relevant globally. This book will appeal to European legislators and policy-makers, privacy and data protection practitioners, certification bodies, international organisations, and academics.Rowena Rodrigues is a Senior Research Analyst with Trilateral Research Ltd. in London and Vagelis Papakonstantinou is a Senior Researcher at the Vrije Universiteit Brussel in Brussels.

Privacy and Identity in a Networked Society: Refining Privacy Impact Assessment (Routledge New Security Studies)

by Stefan Strauß

This book offers an analysis of privacy impacts resulting from and reinforced by technology and discusses fundamental risks and challenges of protecting privacy in the digital age. Privacy is among the most endangered "species" in our networked society: personal information is processed for various purposes beyond our control. Ultimately, this affects the natural interplay between privacy, personal identity and identification. This book investigates that interplay from a systemic, socio-technical perspective by combining research from the social and computer sciences. It sheds light on the basic functions of privacy, their relation to identity, and how they alter with digital identification practices. The analysis reveals a general privacy control dilemma of (digital) identification shaped by several interrelated socio-political, economic and technical factors. Uncontrolled increases in the identification modalities inherent to digital technology reinforce this dilemma and benefit surveillance practices, thereby complicating the detection of privacy risks and the creation of appropriate safeguards. Easing this problem requires a novel approach to privacy impact assessment (PIA), and this book proposes an alternative PIA framework which, at its core, comprises a basic typology of (personally and technically) identifiable information. This approach contributes to the theoretical and practical understanding of privacy impacts and thus, to the development of more effective protection standards. This book will be of much interest to students and scholars of critical security studies, surveillance studies, computer and information science, science and technology studies, and politics.

Privacy and Identity Management: 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30–September 2, 2022, Proceedings (IFIP Advances in Information and Communication Technology #671)

by Felix Bieker Joachim Meyer Sebastian Pape Ina Schiering Andreas Weich

This book contains selected papers presented at the 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August/September 2022. The 9 full papers and 5 workshop and tutorial papers included in this volume were carefully reviewed and selected from 23 submissions. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Privacy and Identity Management: 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Maribor, Slovenia, September 21–23, 2020, Revised Selected Papers (IFIP Advances in Information and Communication Technology #619)

by Michael Friedewald Stefan Schiffner Stephan Krenn

This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Maribor, Slovenia, in September 2020.*The 13 full papers included in this volume were carefully reviewed and selected from 21 submissions. Also included is a summary paper of a tutorial. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.*The summer school was held virtually.

Privacy and Identity Management. Between Data Protection and Security: 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2021, Virtual Event, August 16–20, 2021, Revised Selected Papers (IFIP Advances in Information and Communication Technology #644)

by Michael Friedewald Stephan Krenn Ina Schiering Stefan Schiffner

This book contains selected papers presented at the 16th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held online in August 2021.The 9 full papers included in this volume were carefully reviewed and selected from 23 submissions. Also included are 2 invited keynote papers and 3 tutorial/workshop summary papers. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Privacy and Identity Management. Data for Better Living: 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers (IFIP Advances in Information and Communication Technology #576)

by Michael Friedewald Melek Önen Eva Lievens Stephan Krenn Samuel Fricker

This book contains selected papers presented at the 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Windisch, Switzerland, in August 2019. The 22 full papers included in this volume were carefully reviewed and selected from 31 submissions. Also included are reviewed papers summarizing the results of workshops and tutorials that were held at the Summer School as well as papers contributed by several of the invited speakers. The papers combine interdisciplinary approaches to bring together a host of perspectives, which are reflected in the topical sections: language and privacy; law, ethics and AI; biometrics and privacy; tools supporting data protection compliance; privacy classification and security assessment; privacy enhancing technologies in specific contexts. The chapters "What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking" and "Privacy Implications of Voice and Speech Analysis - Information Disclosure by Inference" are open access under a CC BY 4.0 license at link.springer.com.

Privacy and Identity Management for the Future Internet in the Age of Globalisation

by Jan Camenisch Simone Fischer-Hübner Marit Hansen

This book contains a range of keynote papers and submitted papers presented at the 9th IFIP WG 9. 2, 9. 5, 9. 6/11. 7, 11. 4, 11. 6/SIG 9. 2. 2 International Summer School, held in Patras, Greece, in September 2014. The 9 revised full papers and 3 workshop papers included in this volume were carefully selected from a total of 29 submissions and were subject to a two-step review process. In addition, the volume contains 5 invited keynote papers. The regular papers are organized in topical sections on legal privacy aspects and technical concepts, privacy by design and privacy patterns and privacy technologies and protocols.

Privacy and Identity Management. Sharing in a Digital World: 18th IFIP WG 9.2, 9.6/11.7, 11.6 International Summer School, Privacy and Identity 2023, Oslo, Norway, August 8–11, 2023, Revised Selected Papers (IFIP Advances in Information and Communication Technology #695)

by Nils Gruschka Ina Schiering Felix Bieker Meiko Jensen Silvia De Conca

This book contains selected papers presented at the 18th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Oslo, Norway during August 8 - 11, 2023. The 21 full papers, including 2 workshops papers, presented in this book were carefully reviewed and selected from 30 submissions. The proceedings also contain two invited talks. As in previous years, one of the goals of the IFIP Summer School was to encourage the publication of thorough research papers by students and emerging scholars. The papers combine interdisciplinary approaches to bring together a host of perspectives, such as technical, legal, regulatory, socio-economic, social or societal, political, ethical, anthropological, philosophical, or psychological perspectives.

Privacy and Identity Management. The Smart Revolution: 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers (IFIP Advances in Information and Communication Technology #526)

by Eleni Kosta Simone Fischer-Hübner Marit Hansen Igor Nai-Fovino

This book contains selected papers presented at the 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Management, held in Ispra, Italy, in September 2017.The 12 revised full papers, 5 invited papers and 4 workshop papers included in this volume were carefully selected from a total of 48 submissions and were subject to a three-phase review process. The papers combine interdisciplinary approaches to bring together a host of perspectives: technical, legal, regulatory, socio-economic, social, societal, political, ethical, anthropological, philosophical, and psychological. They are organized in the following topical sections: privacy engineering; privacy in the era of the smart revolution; improving privacy and security in the era of smart environments; safeguarding personal data and mitigating risks; assistive robots; and mobility and privacy.

Privacy and Identity Management. Time for a Revolution?

by David Aspinall Jan Camenisch Marit Hansen Simone Fischer-Hübner Charles Raab

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9. 2, 9. 5, 9. 6/11. 7, 11. 4, 11. 6/SIG 9. 2. 2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.

Privacy and Personality

by Russell L. Ciochon

Like many concepts, privacy has a commonly accepted core of meaning with an indefinite or variable periphery. Some would wish to enlarge the core. It would be pointless to attempt to establish a definition by way of introduction to a series of essays that themselves provide no single definition. But the themes of freedom, justice, rational choice, and community always seem to appear in any discussion of privacy. Privacy is a penultimate good. Perhaps, in certain usages--such as autonomy--it is an ultimate good, desirable for its own sake and grounded on nothing more final. Of course, the right of privacy may sometimes be asserted to conceal illegal or immoral acts. When that occurs, it appears to be put to an instrumental use. But, insofar as we justify such claims, it is not because they prevent the detection of immorality or violations of the law. Rather, at least in the case of illegal acts, it is because the means being challenged themselves violate privacy.The individual control-human dignity foundation for privacy, is closely related to personality. Privacy provides relief from tension and opportunity for the development of intimate relations with others. All of us have standards of behavior that are higher than we can maintain at all times, and these standards are widely shared in the society in which we live. If we do not observe them we are likely to be criticized, or we fear that we shall be, and we suffer also from loss of self-esteem. Whether in some final sense the concept of privacy is culture bound is impossible to establish, in the absence of any known society in which elements of privacy are not to be found.

Privacy and Power

by Miller Russell A.

Edward Snowden's leaks exposed fundamental differences in the ways Americans and Europeans approach the issues of privacy and intelligence gathering. Featuring commentary from leading commentators, scholars and practitioners from both sides of the Atlantic, the book documents and explains these differences, summarized in these terms: Europeans should 'grow up' and Americans should 'obey the law'. The book starts with a collection of chapters acknowledging that Snowden's revelations require us to rethink prevailing theories concerning privacy and intelligence gathering, explaining the differences and uncertainty regarding those aspects. An impressive range of experts reflect on the law and policy of the NSA-Affair, documenting its fundamentally transnational dimension, which is the real location of the transatlantic dialogue on privacy and intelligence gathering. The conclusive chapters explain the dramatic transatlantic differences that emerged from the NSA-Affair with a collection of comparative cultural commentary.

Privacy and Security for Cloud Computing

by George Yee Siani Pearson

This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the field and novel, cutting-edge research. A Glossary is also included at the end of the book. Topics and features: considers the various forensic challenges for legal access to data in a cloud computing environment; discusses privacy impact assessments for the cloud, and examines the use of cloud audits to attenuate cloud security problems; reviews conceptual issues, basic requirements and practical suggestions for provisioning dynamically configured access control services in the cloud; proposes scoped invariants as a primitive for analyzing a cloud server for its integrity properties; investigates the applicability of existing controls for mitigating information security risks to cloud computing environments; describes risk management for cloud computing from an enterprise perspective.

Privacy and Security for Mobile Crowdsourcing (River Publishers Series in Digital Security and Forensics)

by Shabnam Sodagari

This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations and applications. Discussed approaches help build intuition to apply these concepts to a broad range of system security domains toward dimensioning of next generations of mobiles crowdsensing applications. This book offers vigorous techniques as well as new insights for both beginners and seasoned professionals. It reflects on recent advances and research achievements. Technical topics discussed in the book include but are not limited to: Risks affecting crowdsensing platforms Spatio-temporal privacy of crowdsourced applications Differential privacy for data mining crowdsourcing Blockchain-based crowdsourcing Secure wireless mobile crowdsensing. This book is accessible to readers in mobile computer/communication industries as well as academic staff and students in computer science, electrical engineering, telecommunication systems, business information systems, and crowdsourced mobile app developers.

Refine Search

Showing 44,851 through 44,875 of 59,366 results