Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (14)
  • New York : McGraw-Hill Education  (8)
  • Boston, MA : Safari  (6)
  • Organizational change  (8)
  • Computer networks ; Security measures
Datasource
Material
Language
Years
Year
  • 1
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071838979 , 007183897X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Organizational change ; Business planning ; Electronic books ; Creative ability in business ; Creative thinking ; Technological innovations ; New products ; Electronic books ; local
    Abstract: One of the world's foremost experts on the topic of the future of work and human capital, Lynda Gratton argues that global corporations can be major players in changing the world, with their massive networks of human resources, varieties of expertise, and vast organizational skills. In The Key , Gratton shows how companies like IKEA, Nike, Vodaphone, and Unilever are devising innovative ways to tackle critical social issues, and she describes how corporate leaders can transform their own company into an organization equipped to tackle today's toughest issues. Lynda Gratton is Professor of Management Practice at London Business School and the founder of the Hot Spots Movement. She has written seven books and numerous academic articles and is considered one of the world's authorities on people in organizations.
    Note: Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed Oct. 30, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071800150 , 0071800158
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 4th ed.
    Keywords: Data protection ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit , Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool's function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to quickly find the solution you need to safeguard your system from the latest, most devastating hacks. Demonstrates how to configure and use these and other essential tools: Virtual machines and emulators: Oracle VirtualBox, VMware Player, VirtualPC, Parallels, and open-source options Vulnerability scanners: OpenVAS, Metasploit File system monitors: AIDE, Samhain, Tripwire Windows auditing tools: Nbtstat, Cain, MBSA, PsTools Command-line networking tools: Netcat, Cryptcat, Ncat, Socat Port forwarders and redirectors: SSH, Datapipe, FPipe, WinRelay Port scanners: Nmap, THC-Amap Network sniffers and injectors: WinDump, Wireshark, ettercap, hping, kismet, aircrack, snort Network defenses: firewalls, packet filters, and intrusion detection systems War dialers: ToneLoc, THC-Scan, WarVOX Web application hacking utilities: Nikto, HTTP utilities, ZAP, Sqlmap Password cracking and brute-force tools: John the Ripper, L0phtCrack, HashCat, pwdump, THC-Hydra Forensic utilities: dd, Sleuth Kit, Autopsy, Security Onion Privacy tools: Ghostery, Tor, GnuPG, Truecrypt, Pidgin-OTR
    Note: Previous ed.: 2006. - Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed June 27, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780071816250 , 0071816259
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Leadership ; Organizational change ; Electronic books ; Electronic books ; local
    Abstract: A powerful new model for driving positive change in any business In Choosing Change , two renowned leaders in the field of organizational change teach business leaders how to create "change leaders" and change-focused companies-a two-pronged approach that has been proven effective. Part One leverages cutting-edge thinking from psychology, neuroscience, and executive development to provide real, actionable help in the creation of a 21st century change leader. Part Two explores organizational theory, management, and organizational learning to provide real and actionable help in creating a new kind of change-focused organization that integrates change into organizational DNA. Walter McFarland is 2013 Chairman of ASTD and a consulting executive focused on the leadership of large scale organizational change. He is a former Senior Vice President at Booz Allen Hamilton. Susan Goldsworthy is a Master International Coach, author, and former Olympic finalist. She teaches and speaks internationally on the topics of executive development, leadership, and change.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    ISBN: 1000618579 , 9781000618570 , 1138438219 , 9781138438217 , 1482218704 , 9781482218701
    Language: English
    Pages: 1 online resource (165 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 658.4/01
    Keywords: Business planning ; Organizational change ; Communication in management ; Electronic books ; local ; Business planning ; Communication in management ; Organizational change
    Abstract: The problem with most Hoshin Kanri books is that they describe a complex methodology that is overwhelming to most leaders and their organizations. The need to essentially change the culture of the entire organization to make Hoshin work isn’t practical for most companies when first starting out. The Basics of Hoshin Kanri uses an easy-to-follow story format to simplify and explain Hoshin Kanri – a method for strategy deployment. Supplying clear descriptions of the steps of Hoshin Kanri, it advocates using Hoshin as an important tool for improving an organization’s existing planning and execution system while simultaneously moving the culture of the organization forward. The book provides readers with a new understanding of Hoshin Kanri as a powerful deployment system for strategic planning, defining a direction and priorities, and aligning the organization around that direction. It begins by telling the story of a manufacturing executive that uses a simple Hoshin Kanri approach to make significant change in his personal life. Next, the book illustrates how this executive prepares to apply Hoshin Kanri to deploy strategy within his business. It concludes by presenting fascinating excerpts from the author’s own interviews with experts in the field of Hoshin Kanri. All business leaders want their organizations to be "great" in all respects, but the reality is that they must get to "good" before they can consider becoming "great."
    Note: Online resource; Title from title page (viewed August 21, 2014) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780071831383 , 007183138X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Organizational behavior ; Diffusion of innovations ; Organizational change ; Leadership ; Management ; Electronic books ; Electronic books ; local
    Abstract: Best practices for using accountability, trust, and purpose to turn your long-term vision into reality Accountability explains why the "carrot-and-stick" approach doesn't work-and describes how to build and sustain a culture based on shared beliefs, positive action, and internal leadership development. The author's conclusions are based on data resulting from his work with more than 3,000 executives worldwide, plus exclusive interviews with Fortune 's Most Admired Companies and Best Places to Work. Greg Bustin has written a monthly bulletin about leadership and accountability that goes to more than 4,000 managers/executives. He speaks about 50 times per year in the U.S., Canada, and the UK and is one of the top-rated Vistage speakers. He also gives workshops and webinars on planning, execution, and accountability to business owners and leaders in the U.S. and Canada.
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780071828949 , 007182894X
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Organizational change ; Cost effectiveness ; Leadership ; Electronic books ; Electronic books ; local
    Abstract: The first of its kind-a Value Stream Mapping book written for those in service and office environments who need to streamline operations Value Stream Mapping is a practical, how-to guide that helps decision-makers improve value stream efficiency in virtually any setting, including construction, energy, financial service, government, healthcare, R&D, retail, and technology. It gives you the tools to address a wider range of important VSM issues than any other such book, including the psychology of change, leadership, creating teams, building consensus, and charter development. Karen Martin is principal consultant for Karen Martin & Associates, LLC, instructor for the University of California, San Diego's Lean Enterprise program, and industry advisor to the University of San Diego's Industrial and Systems Engineering program. Mike Osterling provides support and leadership to manufacturing and non-manufacturing organizations on their Lean Transformation Journey. In a continuous improvement leadership role for six years, Mike played a key role in Square D Company's lean transformation in the 1990s.
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed Feb. 6, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780071820790 , 0071820795
    Language: English
    Pages: 1 online resource (1 v.)
    Parallel Title: Erscheint auch als
    Keywords: Drucker, Peter F ; (Peter Ferdinand) ; 1909-2005 ; Management ; Organizational change ; Change (Psychology) ; Electronic books ; Electronic books ; local
    Abstract: YOUR FUTURE BEGINS TODAY You can dream it. You can plan it. You can try to make it happen. But you can never really prepare for the future unless you have a future-focused mindset. That is the underlying message behind the inspiring words and wisdom of Peter Drucker, the legendary "father of modern management." Drucker believed that the future must be created--day by day, person by person--rather than be left to chance or fate. This powerful book by Drucker scholar and author Bruce Rosenstein incorporates the master's time-tested principles into a step-by-step daily plan that will change your life forever. Starting right now, you can: Create a future-focused mindset. Learn how to build a better tomorrow by taking steps today. Determine the future by what has already happened. Look for clues in the past to forecast the future. Become your own successor. Keep yourself in demand and in control of your destiny. Shape the future of your organization. Go beyond the planning stage and create real change. Build your future beyond your current workplace. Identify challenges and opportunities in all aspects of your life. Whether you're a recent college graduate faced with a difficult job market, an ambitious entrepreneur trying to anticipate the Next Big Thing, or a struggling executive weathering a storm of constant global change, Drucker's surprisingly timely approach to the future will guide you through anything the world throws at you. You'll discover creative techniques for rolling with the punches and landing on your feet, open-minded strategies for turning your ideas into action, and the latest tools for adapting to new technologies like social media and Internet marketing. You'll find inspiring advice and insights drawn from personal interviews with Drucker himself and some of the greatest business leaders of our time. Most importantly, you'll develop your own exciting, forwardthinking approach to the future that will dramatically alter your life, inside and outside the office. This is how you take charge of your destiny. This is how you make your dreams come true. This is how to Create Your Future the Peter Drucker Way . PRAISE FOR CREATE YOUR FUTURE THE PETER DRUCKER WAY : "Rosenstein skillfully draws on both his own wisdom and that of his mentor to deliver a plan for individuals and businesses in creating a future rich in personal and professional success. Leave your compass at home; all you need is Rosenstein's new book!" -- MARSHALL GOLDSMI...
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780071798778 , 0071798773
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Edition: 2nd ed.
    Parallel Title: Erscheint auch als
    Keywords: Internet telephony ; Security measures ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP , Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (418 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The CRC Press Terrorism Reader assembles the insight of an unrivaled pool of author experts to provide the ultimate comprehensive resource on terrorism. With information drawn from premier titles in the CRC Press collection, the book begins by discussing the origins and definitions of terrorism as well as its motivations and psychology. It goes on to explore a range of issues, providing readers with an understanding of what the terrorist threat is, the history behind it, and strategies to detect, mitigate, and prevent attacks. Topics include: Terrorist organizations and cells Phases of the terrorist cycle, including target selection, planning and preparation, escape and evasion, and media exploitation Weapons of mass destruction (WMDs), including chemical, biological, radiological, and nuclear (CBRN) Methods for deterrence and intelligence-driven counterterrorism The terrorist threat from Latin America, Europe, the Middle East, and Asia The impact of the Arab Spring Why suicide bombings are the ultimate terrorist tool The crime-terror nexus and terrorist funding Technology in terrorism and counterterrorism Providing real-world insight and solutions to terrorist threats and acts at home and abroad, the book goes beyond theory to deliver practitioner knowledge from the field straight into the reader’s hands.
    Note: Online resource; Title from title page (viewed November 11, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Productivity Press | Boston, MA : Safari
    ISBN: 9781482201550 , 1482201550
    Language: English
    Pages: 1 online resource (183 pages)
    Edition: 1st edition
    DDC: 658
    Keywords: Lean manufacturing ; Organizational change ; Industrial management ; Entrepreneurship ; Success in business ; Electronic books ; local ; Production allégée ; Changement organisationnel ; Gestion d'entreprise ; Industrial management ; Lean manufacturing ; Organizational change
    Abstract: If you’ve employed consultants and embarked on a Lean transformation only to find your efforts stall after the consultants leave, this book will teach you what you must do to stay the course over the long term. Using a compelling novel format, Sustainable Lean: The Story of a Cultural Transformation illustrates the process of implementing a sustainable Lean transformation. The book follows Jim, the plant manager of an electronics firm that has already seen its first Lean initiative fail. Jim realizes that if he doesn’t act quickly, his job and the jobs of everyone in the factory might be in jeopardy. Jim meets a Lean consultant who agrees to help him implement and sustain a new transformation. Readers follow along as Jim learns invaluable lessons that help him and his plant see costs plummet, on-time delivery reach nearly 100 percent, and defects drop by close to 80 percent. Using simple terms and an ongoing example, the book demonstrates how to use top-down metrics to identify strategic and tactical opportunities for improvement. It describes how to conduct Hoshin Kanri (strategic policy deployment). It also describes the relationship between top-down metrics, organizational accountability, the breaking down of "stovepipes," and the concept of "alignment" that comes about as the result of Hoshin Kanri. Detailing a data-driven methodology to help you set boundaries for effective decision making, this book will inspire manufacturers to achieve world-class production and efficiency standards—one factory, one business at a time.
    Note: Online resource; Title from title page (viewed March 1, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Auerbach Publications | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (261 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The rapidly increasing sophistication of cyber intrusions makes them nearly impossible to detect without the use of a collaborative intrusion detection network (IDN). Using overlay networks that allow an intrusion detection system (IDS) to exchange information, IDNs can dramatically improve your overall intrusion detection accuracy. Intrusion Detection Networks: A Key to Collaborative Security focuses on the design of IDNs and explains how to leverage effective and efficient collaboration between participant IDSs. Providing a complete introduction to IDSs and IDNs, it explains the benefits of building IDNs, identifies the challenges underlying their design, and outlines possible solutions to these problems. It also reviews the full-range of proposed IDN solutions—analyzing their scope, topology, strengths, weaknesses, and limitations. Includes a case study that examines the applicability of collaborative intrusion detection to real-world malware detection scenarios Illustrates distributed IDN architecture design Considers trust management, intrusion detection decision making, resource management, and collaborator management The book provides a complete overview of network intrusions, including their potential damage and corresponding detection methods. Covering the range of existing IDN designs, it elaborates on privacy, malicious insiders, scalability, free-riders, collaboration incentives, and intrusion detection efficiency. It also provides a collection of problem solutions to key IDN design challenges and shows how you can use various theoretical tools in this context. The text outlines comprehensive validation methodologies and metrics to help you improve efficiency of detection, robustness against malicious insiders, incentive-compatibility for all participants, and scalability in network size. It concludes by highlighting open issues and future challenges.
    Note: Online resource; Title from title page (viewed November 19, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (954 pages)
    Edition: 2nd edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: The concept of Crime Prevention Through Environmental Design (CPTED) has undergone dramatic changes over the last several decades since C. Ray Jeffery coined the term in the early 1970s, and Tim Crowe wrote the first CPTED applications book. The second edition of 21st Century Security and CPTED includes the latest theory, knowledge, and practice of CPTED as it relates to the current security threats facing the modern world: theft, violent crime, terrorism, gang activity, and school and workplace violence. This significantly expanded edition includes the latest coverage of proper lighting, building design-both the interior and exterior-physical security barriers, the usage of fencing, bollards, natural surveillance, landscaping, and landscape design. Such design concepts and security elements can be applied to address a wide variety of threats including crime prevention, blast mitigation, and CBRNE threat protection. Authored by one of the U.S.'s renowned security experts-and a premiere architect and criminologist-the book is the most comprehensive examination of CPTED and CPTED principles available. This edition includes a complete update of all chapters in addition to five new chapters, over 700 figure illustrations and photos, numerous tables and checklists, and a 20-page color plate section. This latest edition: Features five new chapters including green and sustainable buildings, infrastructure protection, and premises liability Presents step-by-step guidelines and real-world applications of CPTED concepts, principles and processes-from risk assessment to construction and post-occupancy evaluation Outlines national building security codes and standards Examines architectural surety from the perspective of risk analysis and premises liability Demonstrates CPTED implementation in high-security environments, such as hospitals, parks, ATMs, schools, and public and private sector buildings A practical resource for architects, urban planners and designers, security managers, law enforcement, CPTED practitioners, building and property managers, homeland security professionals, and students, 21st Century Security and CPTED, Second Edition continues to serve as the most complete and up-to-date reference available on next-generation CPTED practices today.
    Note: Online resource; Title from title page (viewed June 25, 2013) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    New York : McGraw-Hill Education
    ISBN: 9780071794268 , 0071794263
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Series Statement: Infosec pro guide
    Parallel Title: Erscheint auch als
    Keywords: Cryptography ; Data encryption (Computer science) ; Electronic books ; Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Security Smarts for the Self-Guided IT Professional This complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques. Cryptography: InfoSec Pro Guide provides you with an actionable, rock-solid foundation in encryption and will demystify even a few of the more challenging concepts in the field. From high-level topics such as ciphers, algorithms and key exchange, to practical applications such as digital signatures and certificates, the book delivers working tools to data storage architects, security mangers, and others security practitioners who need to possess a thorough understanding of cryptography. True to the hallmarks of all InfoSec Pro Guides, the book imparts the hard-learned lessons and experiences of knowledgeable professionals in security, providing know-how that otherwise takes years to learn. You're led through the Why and How of cryptography, the history of the science, the components of cryptography and how it is applied to various areas in the field of security. Challenging crypto puzzles in every chapter Ready-to-implement cryptographic techniques explained Lingo-Common security terms defined so that you're in the know on the job IMHO-Frank and relevant opinions based on the author's years of industry experience Budget Note-Tips for getting security technologies and processes into your organization's budget In Actual Practice-Exceptions to the rules of security explained in real-world contexts Your Plan-Customizable checklists you can use on the job now Into Action-Tips on how, why, and when to apply new skills and techniques at work
    Note: Includes index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    ISBN: 9781466597587 , 1466597585 , 9781315300320 , 131530032X , 9781466554313 , 1466554312 , 9781466597570 , 1466597577
    Language: English
    Pages: 1 online resource (237 pages)
    Edition: 1st edition
    Parallel Title: Erscheint auch als
    DDC: 658.5
    Keywords: Lean manufacturing ; Manufacturing processes ; Production management ; Organizational change ; Industrial efficiency ; Organizational Innovation ; Electronic books ; local ; Production allégée ; Fabrication ; Production ; Gestion ; Changement organisationnel ; Efficience dans l'industrie ; manufacturing ; Industrial efficiency ; Lean manufacturing ; Manufacturing processes ; Organizational change ; Production management
    Abstract: Tracing the author’s decades-long continuous improvement journey, Relentless Improvement: True Stories of Lean Transformations walks readers through vivid shop floor experiences to convey a genuine feel for the environments in which Lean Six Sigma transformations occur. Recounting numerous Lean Six Sigma transformations, it illustrates the spectrum of successful operational tactics. The story starts just outside Detroit, Michigan in the 1970s when the auto industry was booming, and most people in the area worked in the car factories, or in one of the component factories that supplied the Big Three. The complexity and detail of the projects grow chapter by chapter. The book begins by explaining how to manage Lean basics such as applying 5S, shortening product cycle times, and creating standard work. It then progresses to factory Lean Six Sigma transformations. Providing implementation guidance geared to functions on the operational level, the book: Presents stories based on the author’s interactions with company leaders and shop-floor employees in the midst of great change Illustrates real-world plant politics and manufacturing situations using compelling stories Highlights valuable lessons learned at the end of each chapter Using an engaging story format, the book recounts the author’s career experiences to provide you with a real-world understanding of how to use Lean tools. The stories in the book illustrate everything from standard work and takt time to Kaizen events and Total Productive Maintenance. The text also includes accounts of "front end" or administrative processes such as product development and materials handling.
    Note: Online resource; Title from title page (viewed November 28, 2012) , Mode of access: World Wide Web.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...