The Definitive Resource On Information And Computer

2y ago
20 Views
2 Downloads
1.38 MB
6 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Oscar Steel
Transcription

The Definitive Resourceon Informationand Computer SecurityaSPECIAL PRE-PUB OFFER!Individual volumes: 250 eachthrough 1/31/06; 300 thereafterThree-volume set: 750 eachthrough 1/31/06; 900 thereafterThis definitive 3-volume Handbook offers coverageof both established and cutting-edge theoriesand developments on information and computersecurity. Among industries expected to becomeincreasingly dependent upon the information andcomputer security and active in understanding themany issues surrounding this important and fastgrowing field are: government agencies, military,education, libraries, health, medical, lawenforcement, accounting firms, law firms, justice,manufacturing, financial services, insurance,communications, transportation, aerospace,energy, biotechnology and utilities.Volume I: Key Concepts, Infrastructure, Standardsand ProtocolsVolume II: Information Warfare, Social, Legal, andInternational Issues and Security FoundationsVolume III: Threats, Vulnerabilities, Prevention,Detection and Management ContentsEDITED BY HOSSEIN BIDGOLI,CALIFORNIA STATE UNIVERSITY,BAKERSFIELD, CALIFORNIA“The Handbook of Information Securityis . . . a must have reference!”—Donn B. Parker, CISSP, Author and retiredSenior Information Systems Management Consultant

CONTRIBUTORS FROM AROUND THE WORLD.Australia, Austria, Canada, China,France, Germany, Hungary, Italy,United Kingdom, United StatesDetailedreference guideCutting-edge r your convenienceKEY FEATURES: The Handbook provides researchers and managers with asolid coverage of the core technologies and applications inthe information security field. Articles in the Handbook have been rigorously peer-reviewedby more than 1,000 experts chosen from around the world.Easy-to-readtypeface Includes more than 200 articles from over 200 leading experts. Each article follows a unique format including Title andAuthor, Glossary, Abstract, Introduction, Body, Conclusion,Cross-references, and Bibliography. This unique format assiststhe readers to pick and choose various sections of an articleand also creates consistency throughout the entire series.

Volume I: Key Concepts,Infrastructure, Standards and ProtocolsPart 1: Key Conceptsand Applications Relatedto Information SecurityExtranets: Applications,Development, Security and PrivacyStephen W. ThorpeNeumann CollegeDigital CommunicationRobert W. Heath Jr.The University of Texas, AustinAtul A. SalvekarIntel CorporationWilliam BardThe University of Texas, AustinInternet BasicsBusiness-to-BusinessHossein BidgoliElectronic CommerceCalifornia State University, Bakersfield Julian J. RayDigital EconomyUniversity of RedlandsLocal Area NetworksNirvikar SinghClick-and-Brick Electronic Commerce Wayne C. SummersUniversity of California, Santa Cruz Charles SteinfieldColumbus State UniversityOnline Retail Banking: SecurityMichigan State UniversityWide Area and Metropolitan AreaConcerns, Breaches and Controls Mobile CommerceNetworksKent BelascoVijay AtluriLynn A. DeNoiaFirst Midwest Bank, Itasca, ILRutgers UniversityRensselaer Polytechnic InstituteSiaw-Peng WanE-EducationandInformationHome Area NetworkingElmhurst CollegePrivacy and SecuritySherali ZeadallyDigital Libraries: SecurityWilliam K. JacksonWayne State Universityand Preservation ConsiderationsSouthern Oregon UniversityPriya KubherCavan McCarthyWayne State UniversitySecurity in E-LearningLouisiana State UniversityEdgar R. WeipplNadeem AnsariE-Mail and Instant MessagingVienna University of Technology,Wayne State UniversityBhagyavatiVienna, AustriaPublic Network TechnologiesColumbus State UniversityE-Governmentand SecurityInternet Relay ChatShannon SchelinDale R. ThompsonPaul L. WittThe University of North Carolina,University of ArkansasTexas Christian UniversityChapel HillAmy W. AponOnline CommunitiesG. David GarsonUniversity of ArkansasLee SproullNorth Carolina State UniversityClient/Server Computing: PrinciplesNew York UniversityE-Government Security Issuesand Security ConsiderationsGroupware: Risks, Threats andand MeasuresDaniel J. McFarlandVulnerabilities in the Internet Age William C. BarkerRowan UniversityPierre BalthazardNational Institute of StandardsPeer-to-Peer SecurityArizona State Universityand TechnologyAllan FriedmanJohn WarrenInternational Security IssuesHarvard UniversityUniversity of Texas, San Antonioof E-GovernmentL. Jean CampSearch Engines: Security, Privacy Karin GeiselhartHarvard UniversityUniversity of Canberra, Australiaand Ethical IssuesSecurity MiddlewareRaymond WismanLinda VoloninoPart2:InfrastructurefortheIndiana University SoutheastCanisius CollegeInternet, Computer NetworksWeb Servicesand Secure Information TransferRichard P. VoloninoAkhil SahaiCanisius CollegeHewlett-Packard LaboratoriesConducted Communications MediaInternet ArchitecturePalo Alto, CAThomas L. PiggGraham KnightSven GraupnerJackson State Community CollegeUniversity College, London, UKHewlett-Packard LaboratoriesRouters and SwitchesPalo Alto, CATCP/IP SuiteHans-Peter DommelPrabhaker MatetiWooyoung KimSanta Clara UniversityWright State UniversityUniversity of Illinois,Radio Frequency and WirelessUrbana-ChampaignVoice over Internet Protocol (VoIP)Communications SecurityRoy MorrisElectronic CommerceOkechukwu UgwejeCapitol CollegeCharles SteinfieldThe University of AkronMichigan State UniversitySecurity and Web Quality of ServiceWireless ChannelsTarek F. AbdelzhaerEDI SecurityP. M. ShankarUniversity of VirginiaMatthew K. McGowanDrexel UniversityBradley UniversityChengdu HuangSecurity in Circuit, MessageUniversity of VirginiaElectronic Payment Systemsand Packet SwitchingIndrajit RayMobile Devices and ProtocolsRobert H. GreenfieldColorado State UniversityMin SongComputer ConsultingOld Dominion UniversityIntranets: Principals, PrivacyDaryle P. Niedermayerand Security ConsiderationsBluetooth TechnologyCGI Group Inc.William T. SchianoBrent A. MillerBentley CollegeIBM CorporationISPECIAL PRE-PUB OFFER!Wireless Local Area NetworksMohammad S. ObaidatMonmouth UniversityG. I. PapadimitriouAristotle University, GreeceS. ObeidatArizona State UniversitySecurity in Wireless Sensor NetworksMohamed EltoweissyVirginia TechStephan OlariuOld Dominion UniversityAshraf WadaaOld Dominion UniversityCellular NetworksJingyuan ZhangThe University of AlabamaIvan StojmenovicUniversity of Ottawa, Ottawa, OntarioMobile IPM. Farooque MesiyaRensselaer Polytechnic InstituteDigital CertificatesAlbert LeviSabanci University, TurkeyInternet E-Mail ArchitectureRobert GezelterSoftware ConsultantPKI (Public Key Infrastructure)Radia PerlmanSun Microsystems LaboratoriesS/MIME (Secure MIME)Steven J. GreenwaldIndependent InformationSecurity ConsultantPGP (Pretty Good Privacy)Stephen A. WeisMassachusetts Institute of TechnologySMTP (Simple Mail Transfer Protocol)Vladimir V. RiabovRivier CollegeInternet Security StandardsRaymond R. PankoUniversity of Hawaii, ManoaIP Multicast and its SecurityKerberosEmilia RostiWilliam StallingsUniversità degli Studi di Milano, Italy Independent ConsultantTCP over Wireless LinksMohsen GuizaniWestern Michigan UniversityAnupama RajuWestern Michigan UniversityAir-Interface Requirementsfor Mobile Data ServicesHarald HaasInternational University Bremen(IUB), GermanyWireless InternetAbbas JamalipourUniversity of Sydney, AustraliaSecurity for Satellite NetworksMichele LuglioUniversity of Rome Tor Vergata, ItalyAntonio SaittoTelespazio, ItalySecurity of BroadbandAccess NetworksPeter L. HeinzmannUniversity of Applied Sciences,Eastern SwitzerlandAd hoc Network SecurityPietro MichiardiInstitut Eurecom, FranceRefik MolvaInstitut Eurecom, FrancePart 3: Standards and Protocolsfor Secure Information TransferStandards for Product SecurityAssessmentIstván Zsolt BertaBudapest University of Technologyand Economics, HungaryLevente ButtyánBudapest University of Technologyand Economics, HungaryIstván VajdaBudapest University of Technologyand Economics, HungaryIPsec: AH (Authentication Header)and ESP (EncapsulatingSecurity Payload)Amel MeddebNational Digital Certification Agencyand University of Carthage, TunisiaN. BoudrigaNational Digital Certification Agencyand University of Carthage, TunisiaMohammad S. ObaidatMonmouth UniversityIPsec: IKE (Internet Key Exchange)Charlie KaufmanMicrosoft CorporationSecure Sockets Layer (SSL)Robert J. BoncellaWashburn UniversityPKCS (Public-Key CryptographyStandards)Yongge WangUniversity of North Carolina, CharlotteSecure Shell (SSH)Xukai ZouPurdue UniversitySecurity and the WirelessApplication Protocol (WAP)Lillian N. CasselVillanova UniversityCynthia PandolfoVillanova UniversityWireless Network Standardsand Protocol (802.11)Prashant KrishnamurthyUniversity of PittsburghP3P (Platform for PrivacyPreferences Project)Lorrie Faith CranorCarnegie Mellon UniversityINDIVIDUAL VOLUMES 250 EACH THROUGH 1/31/06; 300 THEREAFTERVolume 1: Key Concepts, Infrastructure, Standards and Protocols (0-471-64830-2)THREE VOLUME SET 750 THROUGH 1/31/06; 900 THEREAFTERVolume 2: Information Warfare, Social, Legal, and International Issues and Security Foundations (0-471-64831-0)Handbook of Information Security, 3 volumes (0-471-64833-7)Volume 3: Threats, Vulnerabilities, Prevention, Detection and Management (0-471-64832-9)

Volume II: Information Warfare, Social, Legal,and International Issues and Security FoundationsHashes and Message DigestsMagnus DaumandRuhr University Bochum, GermanyHans DobbertinRuhr University Bochum, GermanyPart 1: Information WarfareNumber Theoryfor Information SecurityDuncan A. BuellUniversity of South CarolinaCybercrime and the U.S. CriminalJustice SystemSusan W. BrennerUniversity of DaytonCyberterrorism andInformation SecurityCharles JaegerSouthern Oregon UniversityOnline StalkingDavid J. LoundyDePaul UniversityElectronic AttacksThomas M. ChenSouthern Methodist UniversityMatthew C. ElderSymantec CorporationJimi ThompsonSouthern Methodist UniversityHacktivismPaul A. TaylorUniversity of Leeds, UKJan Li. HarrisSalford University, UKCorporate Spying:The Legal AspectsWilliam A. ZuckerGadsby Hannah LLPScott NathanIndependent ConsultantLaw Enforcement and ComputerSecurity Threats and MeasuresMathieu DeflemUniversity of South CarolinaJ. Eagle ShuttUniversity of South CarolinaPrivacy Law and the InternetRay Everett-ChurchPrivacyClue LLCInternet CensorshipRichard A. SpinelloBoston CollegeCopyright LawRandy CanisGreensfelder, Hemker & Gale, P.C.Patent LawGerald BluhmTyco Fire & SecurityTrademark Law and the InternetRay Everett-ChurchPrivacyClue LLCOnline ContractsG.E. EvansCombating the Cyber Crime Threat: Queen Mary University of LondonDevelopments in GlobalIntellectual Property ResearchLaw EnforcementInstitute, UKRoderic BroadhurstWireless Information WarfareElectronic SpeechUniversity of Hong Kong, Hong KongRandall K. NicholsSeth FinkelsteinThe George Washington UniversityDigital IdentityConsulting ProgrammerComputer Network Operations (CNO) Drummond ReedSoftware PiracyOneName CorporationAndrew BlythRobert K. MoniotUniversity of Glamorgan, UKJerry KindallFordham UniversityEpok, Inc.Electronic ProtectionInternet GamblingNeil C. RoweDigital DivideSusanna Frederick FischerNaval Postgraduate SchoolJaime J. DavilaThe Catholic University of AmericaHampshire CollegeInformation AssuranceThe Digital Millennium Copyright ActPeng LiuLegal, Social and EthicalSeth FinkelsteinPennsylvania State UniversityIssues of the InternetConsulting ProgrammerKenneth Einar HimmaMeng YuDigital Courts,Seattle Pacific UniversityMonmouth Universitythe Law and EvidenceJiwu JingAnonymity and IdentityRobert SladeChinese Academy of Sciences,on the InternetIndependent Consultant, CanadaBeijing, ChinaJonathan WallaceIndependent ConsultantPart 3: Foundations of Information,Part 2: Social and Legal IssuesSpam and the Legal Counter Attacks Computer and Network SecurityCharles JaegerThe Legal Implications ofEncryption BasicsSouthern Oregon UniversityInformation Security: RegulatoryAri JuelsCyberlaw:TheMajorAreas,Compliance and LiabilityRSA LaboratoriesDevelopment and InformationBlaze D. WaleskiSymmetric-Key EncryptionSecurity AspectsFulbright & Jaworski L.L.P.Jonathan KatzDennis M. PowersHackers, CrackersUniversity of MarylandSouthern Oregon Universityand Computer CriminalsData Encryption Standard (DES)Global Aspects of CyberlawDavid DittrichMike SpecinerJulia Alpert GladstoneUniversity of WashingtonIndependent ConsultantBryantCollegeKenneth Einar HimmaThe Advanced Encryption StandardSeattle Pacific UniversityDuncan A. BuellUniversity of South CarolinaIIPublic-Key AlgorithmsBradley S. RubinUniversity of St. ThomasElliptic Curve CryptographyNigel SmartUniversity of Bristol, UKIBE (Identity-Based Encryption)Craig GentryDoCoMo USA LabsCryptographic ProtocolsMarkus JakobssonIndiana University, BloomingtonQuantum CryptographyG. Massimo PalmaUniversità degli Studi di Milano, ItalyForensic ComputingMohamed HamdiNational Digital CertificationAgency, TunisiaNoureddine BoudrigaNational Digital CertificationAgency, TunisiaMohammad S. ObaidatMonmouth UniversityComputer Forensic Proceduresand MethodsJ. Philip CraigerUniversity of Central FloridaComputer Forensics: ComputerMedia Reviews in ClassifiedGovernment AgenciesMichael R. AndersonNew Technologies, Inc.Forensic Analysis of Unix SystemsDario V. ForteUniversity of Milan, Crema, ItalyForensic Analysisof Windows SystemsSteve J. ChapinSyracuse UniversityChester J. MaciagAir Force Research LaboratoryKey LengthsArjen K. LenstraLucent Technologies and TechnischeOperating System SecurityUniversiteit Eindhoven, USAWilliam StallingsKey ManagementIndependent ConsultantXukai ZouUnix SecurityPurdue UniversityMark ShackletteAmandeep ThukralThe University of ChicagoPurdue UniversityLinux SecuritySecure Electronic Voting Protocols A. Justin WilderHelger LipmaaInformation Technology AgencyCybernetica AS (Estonia), FinlandOpenVMS SecurityDigital EvidenceRobert GezelterRobin C. StuartSoftware ConsultantDigital Investigations ConsultantWindows 2000 SecurityDigital WatermarkingE. Eugene Schultzand SteganographyUniversity of California-Berkeley LabM. A. SuhaSoftware DevelopmentUniversity of Bradford, UKand Quality AssuranceB. SadounAl-Balqà Applied University, Jordan Pascal MeunierPurdue UniversityMohammad S. ObaidatThe Common CriteriaMonmouth UniversityJohn P. McDermottLaw EnforcementNaval Research Laboratoryand Digital EvidenceJ. Philip CraigerUniversity of Central FloridaMark PollittDigitalEvidenceProJeff SwaugerUniversity of Central Florida“This book is a ‘must-have’ for anyone practicing or researching any aspect of computer security.”—Aviel D. Rubin, Professor, Computer Science, Johns Hopkins University; Technical Director, Information Security Institute; President, Independent Security Evaluators LLCABOUT THE EDITOR-IN-CHIEF:HOSSEIN BIDGOLI, PHD, is Professor of Management Information Systems at California State University, Bakersfield. Dr. Bidgolihelped set up the first PC lab in the United States. He is the author of 43 textbooks, 28 manuals, and over five dozen technicalarticles and papers on various aspects of computer applications, e-commerce, and information systems security published andpresented throughout the world. Dr. Bidgoli also serves as the editor-in-chief of the Internet Encyclopedia and Encyclopedia ofInformation Systems. Dr. Bidgoli was selected as the California State University Bakersfield’s 2001-2002 Professor of the Year.

Volume III: Threats, Vulnerabilities, Prevention,Detection and Management ContentsPart 1: Threats and Vulnerabilitiesto Information and ComputingInfrastructuresInternal Security ThreatsMarcus K. RogersPurdue UniversityPhysical Security ThreatsMark MichaelKing’s CollegeFixed-Line Telephone SystemVulnerabilitiesMak Ming TakHong Kong University of Scienceand Technology, Hong KongXu YanHong Kong University of Scienceand Technology, Hong KongZenith Y.W. LawJustSolve Consulting, Hong KongCracking WEPPascal MeunierPurdue UniversityMedical Records SecurityNormand M. MartelMedical Technology Research Corp.Denial of Service AttacksE. Eugene SchultzUniversity of California-Berkeley LabAccess Control:Principles and SolutionsS. De Capitani di VimercatiUniversità di Milano, ItalyS. ParaboschiUniversità di Bergamo, ItalyPierangela SamaratiUniversità di Milano, ItalyNetwork AttacksEdward AmorosoAT&T LaboratoriesFault AttacksHamid ChoukriGemplus & University of Bordeaux,FranceMichael TunstallGemplus & Royal HollowayUniversity, FranceSide-Channel AttacksPankaj RohatgiIBM CorporationE-Mail Threats and VulnerabilitiesDavid HarleyOpen University, UKPart 2: Prevention: Keeping theHackers and Crackers at BayE-Commerce VulnerabilitiesSviatoslav BraynovUniversity of Illinois, SpringfieldPhysical Security MeasuresMark MichaelKing’s CollegeHacking Techniquesin Wired NetworksQijun GuPennsylvania State UniversityPeng LiuPennsylvania State UniversityChao-Hsien ChuPennsylvania State UniversityRFID and SecurityStephen A. WeisMassachusetts Institute of TechnologyHacking Techniquesin Wireless NetworksPrabhaker MatetiWright State UniversityComputer Viruses and WormsRobert SladeIndependent Consultant, CanadaTrojan Horse ProgramsAdam YoungCigital, Inc.Hoax Viruses and Virus AlertsRobert SladeIndependent Consultant, CanadaHostile Java AppletsDavid EvansUniversity of VirginiaSpywareTom S. ChanSouthern New Hampshire UniversityMobile Code and SecuritySong FuWayne State UniversityCheng-Zhong XuWayne State UniversityWireless Threats and AttacksRobert J. BoncellaWashburn UniversityWEP SecurityNikita BorisovUniversity of California, BerkeleyBluetooth SecuritySusanne WetzelStevens Institute of TechnologyPassword AuthenticationJeremy L. RasmussenSypris Electronics, LLCVPN ArchitectureStan KurkovskyColumbus State UniversityIP-Based VPNDavid E. McDysanMCI CorporationIdentity ManagementJohn LinnRSA LaboratoriesUse of Deception Techniques:Honeypots and DecoysFred CohenUniversity of New HavenActive Responseto Computer IntrusionsDavid DittrichUniversity of WashingtonKenneth Einar HimmaSeattle Pacific UniversityComputer and NetworkAuthenticationPatrick McDanielPennsylvania State UniversityPart 3: Detection, Recovery,Management and PolicyConsiderationsAntivirus TechnologyMatthew SchmidCigital, Inc.Intrusion Detection Systems BasicsPeng NingNorth Carolina State UniversitySushil JajodiaGeorge Mason UniversityAuditing InformationSystems SecurityS. Rao VallabhaneniSRV Professional PublicationsEvidence Collectionand Analysis ToolsChristopher L. T. BrownTechnology Pathways LLCInformation Leakage:Detection and CountermeasuresPhil VenablesGoldman SachsDigital Rights ManagementRenato IannellaIPR Systems, ItalyWeb HostingDoug KayeIT ConversationsManaging a Network EnvironmentJian RenMichigan State UniversityE-Mail and Internet Use PoliciesNancy J. KingOregon State UniversityForward Security: AdoptiveCryptography Time EvolutionGene ItkisBoston UniversityIIICryptographic PrivacyProtection TechniquesMarkus JakobssonIndiana University, BloomingtonCryptographic HardwareSecurity ModulesNicko van SomerennCipher Corporation, UKSmart Card SecurityMichael TunstallGemplus & Royal HollowayUniversity, FranceSebastien PetitGemplus, FranceStephanie PorteGemplus, FranceClient-Side SecurityCharles BorderRochester Institute of TechnologyServer-Side SecuritySlim RekhisNational Digital Certification Agency,and University of Carthage, TunisiaNoureddine BoudrigaNational Digital Certification Agency,and University of Carthage, TunisiaMohammad S. ObaidatMonmouth UniversityProtecting Web SitesDawn AlexanderUniversity of MarylandApril GilesIndependent ConsultantDatabase SecurityMichael GertzUniversity of California, DavisArnon RosenthalThe MITRE CorporationBiometric Basicsand Biometric AuthenticationJames L. WaymanSan Jose State UniversityIssues and Concernsin Biometric IT SecurityPhilip StathamUK Government BiometricsWorking Group, UKFirewall BasicsJames E. GoldmanPurdue UniversityFirewall ArchitecturesJames E. GoldmanPurdue UniversityPacket Filteringand Stateful FirewallsAvishai WoolTel Aviv University

Volume 3: Threats, Vulnerabilities, Prevention, Detection and Management (0-471-64832-9) THREE VOLUME SET 750 THROUGH 1/31/06; 900 THEREAFTER Handbook of Information Security, 3 volumes (0-471-64833-7) Part 1: Key Concepts and Applications Related to Information Security Internet Basics Hossein

Related Documents:

May 02, 2018 · D. Program Evaluation ͟The organization has provided a description of the framework for how each program will be evaluated. The framework should include all the elements below: ͟The evaluation methods are cost-effective for the organization ͟Quantitative and qualitative data is being collected (at Basics tier, data collection must have begun)

Silat is a combative art of self-defense and survival rooted from Matay archipelago. It was traced at thé early of Langkasuka Kingdom (2nd century CE) till thé reign of Melaka (Malaysia) Sultanate era (13th century). Silat has now evolved to become part of social culture and tradition with thé appearance of a fine physical and spiritual .

On an exceptional basis, Member States may request UNESCO to provide thé candidates with access to thé platform so they can complète thé form by themselves. Thèse requests must be addressed to esd rize unesco. or by 15 A ril 2021 UNESCO will provide thé nomineewith accessto thé platform via their émail address.

̶The leading indicator of employee engagement is based on the quality of the relationship between employee and supervisor Empower your managers! ̶Help them understand the impact on the organization ̶Share important changes, plan options, tasks, and deadlines ̶Provide key messages and talking points ̶Prepare them to answer employee questions

Dr. Sunita Bharatwal** Dr. Pawan Garga*** Abstract Customer satisfaction is derived from thè functionalities and values, a product or Service can provide. The current study aims to segregate thè dimensions of ordine Service quality and gather insights on its impact on web shopping. The trends of purchases have

Chính Văn.- Còn đức Thế tôn thì tuệ giác cực kỳ trong sạch 8: hiện hành bất nhị 9, đạt đến vô tướng 10, đứng vào chỗ đứng của các đức Thế tôn 11, thể hiện tính bình đẳng của các Ngài, đến chỗ không còn chướng ngại 12, giáo pháp không thể khuynh đảo, tâm thức không bị cản trở, cái được

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. Crawford M., Marsh D. The driving force : food in human evolution and the future.

Le genou de Lucy. Odile Jacob. 1999. Coppens Y. Pré-textes. L’homme préhistorique en morceaux. Eds Odile Jacob. 2011. Costentin J., Delaveau P. Café, thé, chocolat, les bons effets sur le cerveau et pour le corps. Editions Odile Jacob. 2010. 3 Crawford M., Marsh D. The driving force : food in human evolution and the future.