Critical Infrastructure Protection III: Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2009
|
Ausgabe: | 1st ed. 2009 |
Schriftenreihe: | IFIP Advances in Information and Communication Technology
311 |
Schlagworte: | |
Online-Zugang: | DE-355 Volltext |
Beschreibung: | 1 Online-Ressource (XVI, 257 Seiten 58 illus.) |
ISBN: | 9783642047985 |
ISSN: | 1868-422X |
DOI: | 10.1007/978-3-642-04798-5 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV050122760 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 250115s2009 xx o|||| 00||| eng d | ||
020 | |a 9783642047985 |9 978-3-642-04798-5 | ||
024 | 7 | |a 10.1007/978-3-642-04798-5 |2 doi | |
035 | |a (ZDB-2-SCS)978-3-642-04798-5 | ||
035 | |a (DE-599)BVBBV050122760 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.11 |2 23 | |
245 | 1 | 0 | |a Critical Infrastructure Protection III |b Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers |c edited by Charles Palmer, Sujeet Shenoi |
250 | |a 1st ed. 2009 | ||
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2009 | |
300 | |a 1 Online-Ressource (XVI, 257 Seiten 58 illus.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a IFIP Advances in Information and Communication Technology |v 311 |x 1868-422X | |
505 | 8 | |a The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. | |
505 | 8 | |a Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty membersand graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. | |
505 | 8 | |a Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. | |
650 | 4 | |a Programming Techniques | |
650 | 4 | |a Coding and Information Theory | |
650 | 4 | |a User Interfaces and Human Computer Interaction | |
650 | 4 | |a Data Structures and Information Theory | |
650 | 4 | |a IT Operations | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Computer programming | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Information theory | |
650 | 4 | |a User interfaces (Computer systems) | |
650 | 4 | |a Human-computer interaction | |
650 | 4 | |a Data structures (Computer science) | |
650 | 4 | |a Electronic data processing / Management | |
650 | 4 | |a Computer science | |
700 | 1 | |a Palmer, Charles |4 edt | |
700 | 1 | |a Shenoi, Sujeet |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642047978 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642048050 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9783642260407 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-04798-5 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-1-SCS | ||
940 | 1 | |q ZDB-2-SCS_2009 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035459630 | |
966 | e | |u https://doi.org/10.1007/978-3-642-04798-5 |l DE-355 |p ZDB-2-SCS |q UBR Paketkauf 2024 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1821312684167004160 |
---|---|
adam_text | |
any_adam_object | |
author2 | Palmer, Charles Shenoi, Sujeet |
author2_role | edt edt |
author2_variant | c p cp s s ss |
author_facet | Palmer, Charles Shenoi, Sujeet |
building | Verbundindex |
bvnumber | BV050122760 |
collection | ZDB-1-SCS |
contents | The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty membersand graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. |
ctrlnum | (ZDB-2-SCS)978-3-642-04798-5 (DE-599)BVBBV050122760 |
dewey-full | 005.11 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.11 |
dewey-search | 005.11 |
dewey-sort | 15.11 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-04798-5 |
edition | 1st ed. 2009 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV050122760</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">250115s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642047985</subfield><subfield code="9">978-3-642-04798-5</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-04798-5</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)978-3-642-04798-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050122760</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.11</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical Infrastructure Protection III</subfield><subfield code="b">Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers</subfield><subfield code="c">edited by Charles Palmer, Sujeet Shenoi</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2009</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 257 Seiten 58 illus.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IFIP Advances in Information and Communication Technology</subfield><subfield code="v">311</subfield><subfield code="x">1868-422X</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty membersand graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Programming Techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User Interfaces and Human Computer Interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Structures and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IT Operations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">User interfaces (Computer systems)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Human-computer interaction</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data structures (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing / Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Palmer, Charles</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shenoi, Sujeet</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642047978</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642048050</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9783642260407</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-04798-5</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2009</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035459630</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-642-04798-5</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="q">UBR Paketkauf 2024</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050122760 |
illustrated | Not Illustrated |
indexdate | 2025-01-15T11:05:29Z |
institution | BVB |
isbn | 9783642047985 |
issn | 1868-422X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035459630 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XVI, 257 Seiten 58 illus.) |
psigel | ZDB-1-SCS ZDB-2-SCS_2009 ZDB-2-SCS UBR Paketkauf 2024 |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series2 | IFIP Advances in Information and Communication Technology |
spelling | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers edited by Charles Palmer, Sujeet Shenoi 1st ed. 2009 Berlin, Heidelberg Springer Berlin Heidelberg 2009 1 Online-Ressource (XVI, 257 Seiten 58 illus.) txt rdacontent c rdamedia cr rdacarrier IFIP Advances in Information and Communication Technology 311 1868-422X The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty membersand graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Programming Techniques Coding and Information Theory User Interfaces and Human Computer Interaction Data Structures and Information Theory IT Operations Computer Science Computer programming Coding theory Information theory User interfaces (Computer systems) Human-computer interaction Data structures (Computer science) Electronic data processing / Management Computer science Palmer, Charles edt Shenoi, Sujeet edt Erscheint auch als Druck-Ausgabe 9783642047978 Erscheint auch als Druck-Ausgabe 9783642048050 Erscheint auch als Druck-Ausgabe 9783642260407 https://doi.org/10.1007/978-3-642-04798-5 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection III describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Risk Management Control Systems Security Infrastructure Security Infrastructure Modeling and Simulation This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2009. Critical Infrastructure Protection III is an important resource for researchers, faculty membersand graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Charles Palmer is a Senior Technical Advisor with the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA. Programming Techniques Coding and Information Theory User Interfaces and Human Computer Interaction Data Structures and Information Theory IT Operations Computer Science Computer programming Coding theory Information theory User interfaces (Computer systems) Human-computer interaction Data structures (Computer science) Electronic data processing / Management Computer science |
title | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers |
title_auth | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers |
title_exact_search | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers |
title_full | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers edited by Charles Palmer, Sujeet Shenoi |
title_fullStr | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers edited by Charles Palmer, Sujeet Shenoi |
title_full_unstemmed | Critical Infrastructure Protection III Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers edited by Charles Palmer, Sujeet Shenoi |
title_short | Critical Infrastructure Protection III |
title_sort | critical infrastructure protection iii third ifip wg 11 10 international conference hanover new hampshire usa march 23 25 2009 revised selected papers |
title_sub | Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers |
topic | Programming Techniques Coding and Information Theory User Interfaces and Human Computer Interaction Data Structures and Information Theory IT Operations Computer Science Computer programming Coding theory Information theory User interfaces (Computer systems) Human-computer interaction Data structures (Computer science) Electronic data processing / Management Computer science |
topic_facet | Programming Techniques Coding and Information Theory User Interfaces and Human Computer Interaction Data Structures and Information Theory IT Operations Computer Science Computer programming Coding theory Information theory User interfaces (Computer systems) Human-computer interaction Data structures (Computer science) Electronic data processing / Management Computer science |
url | https://doi.org/10.1007/978-3-642-04798-5 |
work_keys_str_mv | AT palmercharles criticalinfrastructureprotectioniiithirdifipwg1110internationalconferencehanovernewhampshireusamarch23252009revisedselectedpapers AT shenoisujeet criticalinfrastructureprotectioniiithirdifipwg1110internationalconferencehanovernewhampshireusamarch23252009revisedselectedpapers |