Showing 300,141 - 300,160 results of 304,420 for search '"C "', query time: 0.77s Refine Results
  1. 300141
    by Darmawan, Budi
    Published 2005
    Table of Contents: “…Installation tips -- Embedded installation problems -- Composite transaction problems -- Appendix C. Additional material -- Locating the Web material -- Using the Web material -- System requirements for downloading the Web material -- How to use the Web material -- Abbreviations and acronyms -- Related publications -- IBM Redbooks -- Other publications -- Online resources -- How to get IBM Redbooks -- Help from IBM -- Index -- Back cover…”
    eBook
  2. 300142
    Published 2018
    Table of Contents: “…. -- Todo list - implementing ComponentWillMount -- Pomodoro timer - implementing the constructor and componentDidMount -- Crypto coins exchanger - implementing shouldComponentUpdate -- Notes - implementing componentWillReceiveProps and componentWillUnmount -- C3.js chart - implementing componentDidUpdate -- Basic animation - implementing componentWillUpdate -- How it works... -- Understanding React Pure Components -- Getting ready -- How to do it... -- How it works... -- Preventing XSS vulnerabilities in React -- How to do it... -- How it works... -- There's more... -- Chapter 3: Handling Events, Binding and Useful React Packages -- Introduction -- Binding methods using the constructor versus using arrow functions -- How to do it... -- How it works... -- Creating form elements with events…”
    eBook
  3. 300143
    Published 2017
    Table of Contents: “…6.2.1 Access Service Request (ASR) Form -- 6.2.1.1 Administration Section -- 6.2.1.2 Billing Section -- 6.2.1.3 Contact Section -- 6.2.2 SALI (Service Address Location Information) Form -- 6.2.3 EUSA (End User Special Access) Form -- 6.2.4 OVC (EVC) Form -- 6.2.5 Transport (ENNI) Form -- 6.3 Linkage Between ASR Forms and IT Systems Related to OSS/BSS -- 6.4 Chapter Summary -- 7 - OPERATIONS AND BUSINESS SUPPORT SYSTEMS -- 7.1 Evolution of OSS/BSS Framework -- 7.2 State Machine, Transactional Integrity, Security and High Availability of OSS/BSS -- 7.2.1 State Machine -- 7.2.2 Transactional Integrity -- 7.2.3 Security -- 7.2.4 High Availability of OSS/BSS -- 7.3 Efforts to Reduce Operational Costs -- 7.4 Impact of NFV and SDN on OSS/BSS -- 7.5 Customer Applications Are the Business of Operations/Business Support Systems -- 7.6 Chapter Summary -- 8 - APPLICATIONS OF PEERING CARRIER ETHERNET NETWORKS -- 8.1 Taxonomy of Customers and Applications -- 8.2 Mapping of Application Performance Objectives to Standard MEF CoS Performance Objectives -- 8.3 Mapping Application-Specific Network Functionality to Carrier Ethernet Services -- 8.3.1 IP Backhaul -- 8.3.2 Mobile Backhaul -- 8.3.3 Streaming and Switched Video Transport -- 8.3.4 Cloud Applications -- 8.4 Cyber-Physical Systems and Other Emerging Applications -- 8.5 Process for Converting Application and Topology Information into a Design -- 8.6 Next Steps -- 8.7 Chapter Summary -- 9 - NEXT STEPS IN PEERING CARRIER ETHERNET NETWORKS -- 9.1 Emerging Trends -- 9.2 Next Steps in Ethernet Technology and Peering Carrier Ethernet Networks -- 9.3 Next Steps in Operations and Business Support Systems -- 9.4 Chapter Summary -- REFERENCES -- INDEX -- A -- B -- C -- D -- E -- F -- G -- H -- I -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Back Cover…”
    eBook
  4. 300144
    Published 2017
    Table of Contents: “…Extremal control of a photovoltaic panel -- Appendix A: Matrix Transformation from Any Representation to the Companion Form or Arrow Form -- Appendix B: Determination of the Maximum Error for Pole Placement for a Nonlinear Third-Order Process -- Appendix C: Determining the Attractor in a Nonlinear Process Controlled by Linear Decoupling -- Appendix D: Overvaluation of the Maximum Error in a Tracking Problem for a Lur'e Postnikov Type Process -- Bibliography -- Index…”
    eBook
  5. 300145
    Published 2023
    Table of Contents: “…-- Chapter 18 Building the Center of Excellence -- The Need for an Executive or C-level Data Leader -- Navigating Early Maturity Phases -- The Data Organizational Arc -- Benefits of the Center of Excellence Model -- Connecting Hiring to the Infrastructure and Product Roadmaps -- Getting Access to Talent -- Common Roles for Each Maturity Phase -- What's Next? …”
    eBook
  6. 300146
    by Neff, Sascha
    Published 2023
    Table of Contents: “…6.5 Rückführung auf das Transfermodell -- Forschungsfrage 1: Barrieren des Transfers -- Forschungsfrage 2: Didaktische Konzepte zur Implementationsförderung -- Forschungsfrage 3: Genese lernförderlicher Zustände -- 6.6 Relevanz der Arbeit für das Forschungsfeld -- 6.7 Relevanz der Arbeit für die Schulpraxis -- 6.8 Fazit -- 6.9 Ausblick -- 7 Literaturverzeichnis -- 8 Abbildungsverzeichnis -- 9 Tabellenverzeichnis -- Anhang -- A) Beschreibung der evaluierten virtuellen Labore -- Virtuelles Labor Aufbau, Bedienung und Auswertung -- Virtuelles Labor Stickstofflieferanten -- Virtuelles Labor Chloridgehalt -- Virtuelles Labor pH-Wert -- Virtuelles Labor Sauerstoffsättigung -- Virtuelles Labor Leitfähigkeit -- Virtuelles Labor Fließgeschwindigkeit -- B) Druckvorlagen Arbeitsmaterialien -- Versuchsanleitung Aufbau und Bedienung der Messgeräte -- Sicherung Aufbau und Bedienung der Messgeräte -- Versuchsanleitung Ionengehalte Messen (Chlorid, Nitrat, Ammonium) -- Sicherung Chlorid -- Sicherung Nitrat &amp -- Ammonium -- Versuchsanleitung pH-Wert Messen -- Sicherung pH-Wert -- Versuchsanleitung Sauerstoffgehalt Messen -- Sicherung Sauerstoff -- Versuchsanleitung Leitfähigkeit Messen -- Sicherung Leitfähigkeit -- Versuchsanleitung Fließgeschwindigkeit -- Sicherung Fließgeschwindigkeit -- C) Fragebogen Erhebung Lehrpersonen -- D) Interview-Leitfaden Lehrpersonen -- E) Fragebogen Erhebung Lernende TZP Vorbereitung -- F) Fragebogen Erhebung Lernende TZP Ende Vorbereitung -- G) Digitale Anlagen -- H) Lebenslauf…”
    eBook
  7. 300147
    Published 2024
    Table of Contents: “…-- 10.11 Key Terms -- Appendices -- A Constitution Act, 1867, ss. 91–95, 133 -- B Canadian Bill of Rights, 1960 -- C Constitution Act, 1982 -- D Online Resources -- Index…”
    eBook
  8. 300148
    Published 2007
    Table of Contents: “…16.7 Principles that Reduce the Overall Burden of IT -- PART IV: APPENDICES -- Appendix A: Case Study Conclusion -- Appendix B: Process Descriptions -- B.1 Delivery Processes -- B.2 Service-Oriented Analysis Process -- B.3 Service Modeling Process -- B.4 Service-Oriented Design Processes -- Appendix C: Principles and Patterns Cross-Reference -- Additional Resources -- About the Author -- About the Photos -- Index…”
    eBook
  9. 300149
    Published 2008
    Table of Contents: “…Quizzes -- Chapter 2 -- Chapter 3 -- Chapter 4 -- Chapter 5 -- Chapter 6 -- Chapter 7 -- Chapter 8 -- Chapter 9 -- Chapter 10 -- Chapter 11 -- Chapter 12 -- Chapter 13 -- Chapter 14 -- Chapter 15 -- Chapter 16 -- Chapter 17 -- Appendix B: Decimal to Binary Conversion Table -- Appendix C: ICND1 Exam Updates: Version 1.0 -- Glossary -- Part VII: CD-only -- Appendix D: Subnetting Practice -- Appendix E: Subnetting Reference Pages -- Appendix F: Additional Scenarios -- Appendix G: Subnetting Video Reference -- Appendix H: Memory Tables -- Appendix I: Memory Tables Answer Key -- Appendix J: ICND1 Open-Ended Questions…”
    eBook
  10. 300150
    Published 2002
    Table of Contents: “…Tables used in the examples -- DDL of tables -- Appendix C. Materialized view syntax elements -- Materialized view main syntax elements -- Related publications -- IBM Redbooks -- Other resources -- Referenced Web sites -- How to get IBM Redbooks -- IBM Redbooks collections -- Index -- Back cover…”
    eBook
  11. 300151
    Published 2014
    Table of Contents: “…The Results -- Company 3: LeTourneau Technologies, Inc. -- Company 4: M.C. Gill Corporation -- Lessons from the Four Companies -- Chapter 5: How Do We Know What's True? …”
    eBook
  12. 300152
    Published 2010
    Table of Contents: “…7.4.4 Real-Time Analysers -- 7.4.5 Remote Sensing -- 7.5 Data Reduction and Processing -- 7.5.1 Vibration Amplitude Versus Frequency Analysis -- 7.5.2 Spectrum Averaging -- 7.5.3 Amplitude Versus Frequency Versus Time Analysis -- 7.5.4 Amplitude/Phase Versus rpm Analysis -- 7.5.5 Time Waveform Analysis -- 7.5.6 Lissajous Pattern (Orbit) Analysis -- 7.5.7 Mode-Shape Analysis -- 7.6 Diagnosis and Corrective Actions -- 7.6.1 Steady-State Operating Regime -- 7.6.2 Detection of Perturbation Forces and Corrective Actions -- 7.7 Modal Analysis -- 7.8 Vibration Control -- Conclusion -- Exercises -- Chapter 8: Finite Element Method -- 8.1 Introduction -- 8.2 Important Conditions to be Satisfied -- 8.3 Modelling -- 8.4 Shape Functions -- 8.5 Bar Element -- 8.6 Boundary Conditions -- 8.7 Torsion Element -- 8.8 Beam Element -- Matlab-Tool for Computation -- Introduction -- (I) Display Windows -- (II) Arithmetic Operations -- (III) Built-in Functions -- (IV) Matrix -- (V) Polynomials: -- (VI) System of Linear Equations -- Conclusion -- Exercises -- Chapter 9: Fundamentals of Experimental Modal Analysis -- 9.1 Introduction -- 9.2 Frequency-Response Function -- 9.2.1 Frequency-Response Function-Basic Principles -- Exercises -- Chapter 10: Miscellaneous Topics in Vibration Analysis and Introduction to Noise Analysis -- 10.1 Flow-Induced Vibrations -- 10.2 Acoustics and Analysis of Noise -- 10.2.1 Basics of Sound -- 10.2.2 Amplitude, Frequency, Wavelength, and Velocity -- 10.2.3 Sound Field Definitions -- 10.3 Non-Stationary (Unsteady) Vibrations -- 10.4 Rotor Dynamics and Hydrodynamic Bearings -- Exercises -- Appendix - A -- Appendix - B -- Appendix - C -- Appendix - D -- Index…”
    eBook
  13. 300153
    Published 2022
    Table of Contents: “…Chapter 4: Creating, Configuring, and Managing Identities -- Technical requirements -- Creating, configuring, and managing users -- Member users -- Guest and external users -- AD (hybrid) users -- Creating, configuring, and managing groups -- Microsoft 365 groups -- Security groups -- Specialty groups -- Dynamic groups -- Managing licenses -- License requirements -- License features -- Assigning licenses -- Summary -- Chapter 5: Implementing and Managing External Identities and Guests -- Technical requirements -- Managing external collaboration settings in Azure AD -- B2B -- B2C -- Configuring external collaboration settings -- Inviting external users individually and in bulk -- Inviting guest users -- Managing external user accounts in Azure AD -- Managing guest user licenses -- Password management -- Multi-factor authentication -- Configuring identity providers -- Google configuration -- Facebook configuration -- Summary -- Chapter 6: Implementing and Managing Hybrid Identities -- Technical requirements -- Implementing and managing Azure AD Connect -- Hybrid identity -- Azure AD -- Windows AD -- Azure AD Connect -- Implementing and managing seamless SSO -- Implementing and managing Azure AD Connect Health -- Troubleshooting sync errors -- Summary -- Section 3 - Implementing an Authentication and Access Management Solution -- Chapter 7: Planning and Implementing Azure Multi-Factor Authentication (MFA) and Self-Service Password Reset (SSPR) -- Technical requirements -- Planning an Azure MFA deployment -- What is MFA? …”
    eBook
  14. 300154
    Published 2020
    Table of Contents: “…Freedman -- Jonathan Taala -- Ellie Young -- Appendix A Suppliers and Resources -- Appendix B Safe Practice -- Appendix C Sites with Significant Collections of Vintage Carbon Prints -- Bibliography -- Index…”
    eBook
  15. 300155
    Table of Contents: “…12-2: Authentication, Authorization, and Accounting (AAA) -- 12-3: Dynamically Authenticate and Authorize Users with Authentication Proxy -- 12-4: Controlling Access with Lock and Key Security -- 12-5: Filtering IP Sessions with Reflexive Access Lists -- 12-6: Prevent DoS Attacks with TCP Intercept -- 12-7: Intelligent Filtering with Context-Based Access Control (CBAC) -- 12-8: Detect Attacks and Threats with the IOS Intrusion Prevention System -- 12-9: Control Plane Security -- 12-10: AutoSecure -- Chapter 13 Virtual Private Networks -- 13-1: Using Internet Key Exchange (IKE) for VPNs -- 13-2: IPSec VPN Tunnels -- 13-3: High Availability Features -- 13-4: Dynamic Multipoint VPN (DMVPN) -- 13-5: Secure Socket Layer VPNs -- Further Reading -- Chapter 14 Access Lists and Regular Expressions -- 14-1: IP Access Lists -- 14-2: MAC Address and Protocol Type Code Access Lists -- 14-3: IPv6 Access Lists -- 14-4: Regular Expressions -- Appendixes -- Appendix A: Cisco IOS Software Release and Filename Conventions -- Appendix B: Cabling Quick Reference -- Appendix C: SNMP MIB Structure -- Appendix D: Password Recovery -- Appendix E: Configuration Register Settings -- Appendix F: Well-Known IP Protocol Numbers -- Appendix G: Well-Known IP Port Numbers -- Appendix H: ICMP Type and Code Numbers -- Appendix I: Well-known IP Multicast Addresses -- Appendix J: Tool Command Language (TCL) Reference -- Appendix K: Ethernet Type Codes -- Index…”
    eBook
  16. 300156
    Published 2011
    Table of Contents: “…HiDef Chart -- B: Using the Windows Phone FMRadio -- C: Windows Phone 7 Launchers and Choosers -- D: Dealing with Tombstoning -- Index…”
    eBook
  17. 300157
    Published 2018
    Table of Contents: “…Lückenfolgen 179 -- 7. 7 Kennzahlen zur Lückenstruktur 183 -- 7.8 Einsatz von Kantenlisten zur detaillierten Lückenbestimmung . 186 -- 7.9 Kantenlisten für Weglängen> 2 . 189 -- 7 .10 Graphentheoretische Vergleichskennzahlen 192 -- 8 Lückenbewertungsphase . 197 -- 8.1 Performanzlückenbestimmung und -bewertung . 197 -- 8.1.1 Einfache Bewertungsverfahren für Performanzlücken . 197 -- 8.1.2 Komplexe Bewertungsverfahren für Performanzlücken . 200 -- 8.2 Identifikation von schwachen Knoten . 202 -- 8.3 Zusätzliche Überlegungen zur Bedeutungsbestimmung 204 -- 8.3.1 Wirkungen über die W-Reihe . 204 -- 8.3.2 Matrizenzerlegung und Gewichtung von Subgraphen . 209 -- 8.4 Bewertung von direkten internen Lücken . 211 -- 8.5 Bewertung und Zielwerte für externe Lücken . 218 -- 9 Umlegungsphase . 225 -- 9.1 Generierung der Datenbasis . 225 -- 9.2 Umlegung von Performanzlücken und internen strukturellen Lücken 228 -- 9.3 Umlegung von externen Lücken . 234 -- 10 Matchingphase . 237 -- 10.1 Ähnlichkeits- und Distanzmaße 238 -- 10.1.1 Binäre Nominalskalen 240 -- 10.1.2 Mehrstufige Nominalskalen 246 -- 10.1.3 Ordinale Skalen 250 -- 10.1.4 Metrische Skalen 252 -- 10.2 Referenzpräferenzvergleich - indirekter Vergleich zweier Objekte 255 -- 10.3 Duale Präferenzen 262 -- 10.4 Gesamtähnlichkeitsmaß . 264 -- 10.5 Präferenzprofile für externe Knoten 267 -- 10.5.1 Binäre nominale Skalen . 269 -- 10.5.2 Mehrstufig nominale Skalen . 270 -- 10.5.3 Ordinale Skalen 270 -- 10.5.4 Metrische Skalen 271 -- 10.5.5 Referenzpräferenzbestimmung 273 -- 11 Demonstrationsbeispiel 281 -- 11.1 Datenaufbereitung 281 -- 11.1 .1 Profildaten 282 -- 11.1.2 Transaktionsdaten 283 -- 11.1.3 Abgeleitete Datenquellen . 284 -- 11.2 Strukturanalyse . 291 -- 11.2.1 Erreichbarkeit und Distanzen . 294 -- 11.2.2 Identifikation und Bewertung von Cliquen 295 -- 11.2.3 Blockmodeling 297 -- 11.3 Strukturvergleich . 304 -- 11.4 Lückenbewertung . 320 -- 11.4.1 Identifikation und Bewertung von Performanzlücken . 320 -- 11.4.2 Bewertung von direkten internen Lücken . 324 -- 11.4.3 Bewertung von externen Lücken 329 -- 11.5 Umlegung der Lückenbewertung 335 -- 11.5.1 Umlegung der Bewertung interner Lücken . 335 -- 11.5.2 Umlegung der Effekte externer Knoten 343 -- 11.6 Matching . 346 -- 11.6.1 Präferenzstruktur 346 -- 11.6.2 Gesamtähnlichkeitsmaß für Plattformteilnehmer . 349 -- 11.6.3 Präferenzprofil für potenzielle Teilnehmer . 351 -- 11.6.4 Erweiterung der Transaktionsempfehlungen 352 -- 11. 7 Diskussion 354 -- 12 Rückblick und Ausblick 361 -- 13 Literaturverzeichnis 367 -- Appendix . 381 -- Appendix A: Funktionsübersicht . . 381 -- Appendix B: Klassifikationen . 397 -- Appendix C: IOTgg 401.…”
    eBook
  18. 300158
    Published 2013
    Table of Contents: “…Chapter 4: Using Formulas and Functions -- Reference Cells -- Change Cell References -- Understanding Cell Referencing Types -- Change to R1C1 References -- Name Cells -- Go to a Named Cell -- Using Cell Reference Operators -- Use the Name Manager -- Build Formulas -- Create a Formula -- Adding a Symbolic Formula -- Edit a Formula -- Use Formulas -- Move Formulas -- Copy Formulas -- Recalculate Formulas -- Use External References in Formulas -- Understanding the Trust Center -- Format Conditionally -- Use Functions -- Using Functions Quickly -- Enter a Function -- Enter a Sum in Columns or Rows Quickly -- Find and Correct Errors -- Check for Errors -- Trace Precedent and Dependent Cells -- Watch a Cell -- Evaluate a Formula in Pieces -- Chapter 5: Viewing and Printing Data -- Understanding Excel Views -- Lay Out a Worksheet -- Add Headers and Footers -- Add Content to Headers and Footers -- Add Pictures to Headers and Footers -- Change Margins -- Select Page Orientation -- Work with Zoom -- Use Headings as Page Titles -- Print the Data -- Choose Worksheet Print Options -- Change the Order in Which Pages Print -- Print Comments -- Choose What to Print -- Use Print Areas -- Preview the Print Job -- Scale Your Data Before Printing -- Output the Print Job -- Save and View Custom Views -- Chapter 6: Charting Data -- Create and Design a Chart -- Build a Chart -- Choose a Chart Type -- Selecting Data for Charting -- Choose a Chart Location -- Modify How the Data Is Plotted -- Apply a Chart Layout -- Change a Chart's Style -- Modify Chart Elements -- Select Chart Elements -- Add Titles -- Show or Hide Axes -- Add or Remove Gridlines -- Identifying Chart Elements -- Show or Hide a Legend -- Add Data Labels -- Display the Data Table -- Create Your Own Chart Type -- Use Chart Templates -- Create a Combo Chart -- Format Chart Elements…”
    eBook
  19. 300159
    by Parasram, Shiva V. N.
    Published 2023
    Table of Contents: “…Configuring our WINE installation -- Testing our WINE installation -- Summary -- Part 2: Digital Forensics and Incident Response Fundamentals and Best Practices -- Chapter 6: Understanding File Systems and Storage -- History and types of storage media -- IBM and the history of storage media -- Removable storage media -- Magnetic tape drives -- Floppy disks -- Optical storage media -- Blu-ray Disc -- Flash storage media -- USB ash drives -- Flash memory cards -- Hard disk drives -- Integrated Drive Electronics HDDs -- Serial Advanced Technology Attachment HDDs -- Solid-state drives -- File systems and operating systems -- Microsoft Windows -- Macintosh (macOS) -- Linux -- Data types and states -- Metadata -- Slack space -- Volatile and non-volatile data and the order of volatility -- The importance of RAM, the paging file, and cache in DFIR -- Summary -- Chapter 7: Incident Response, Data Acquisitions, and DFIR Frameworks -- Evidence acquisition procedures -- Incident response and first responders -- Evidence collection and documentation -- Physical acquisition tools -- Live versus post-mortem acquisition -- Order of volatility -- Powered-on versus powered-off device acquisition -- The CoC -- The importance of write blockers -- Data imaging and maintaining evidence integrity -- Message Digest (MD5) hash -- Secure Hashing Algorithm (SHA) -- Data acquisition best practices and DFIR frameworks -- DFIR frameworks -- Summary -- Part 3: Kali Linux Digital Forensics and Incident Response Tools -- Chapter 8: Evidence Acquisition Tools -- Using the fdisk command for partition recognition -- Device identification using the fdisk command -- Creating strong hashes for evidence integrity -- Drive acquisition using DC3DD -- Verifying the hash output of image files -- Erasing a drive using DC3DD -- Drive acquisition using DD -- Drive acquisition using Guymager…”
    eBook
  20. 300160
    Published 2023
    Table of Contents: “…Assessing the System Variables -- For Your Consideration -- Section VI: Analyzing Case Studies -- Chapter 15 Case Study #1 -- Looking at Noise in an Eyewitness Interview -- Case Study #1 -- Topic 1 -- Topic 1 -- Topic 1 -- Topic 3 -- Topic 5 -- Efficacy of Eyewitness Interview AssessmentSM -- Narrative Report for Case Study #1 -- Chapter 16 Case Study #2 -- The Cooperative Eyewitness -- Topic 3 -- Efficacy of Eyewitness Interview AssessmentSM Narrative Report for Case Study #2 -- Chapter 17 Case Study #3 -- Our First Mindful Interview -- Case Study #3 -- Topic 1 -- Topic 2 -- Topic 3 -- Topic 4 -- Topic 5 -- Efficacy of Eyewitness Interview AssessmentSM -- Narrative Report for Case Study #3 -- Chapter 18 Case Study #4 -- An Interview of Complexity -- Topic 1 -- Topic 2 -- Topic 3 -- Topic 4 -- Topic 5 -- Efficacy of Eyewitness Interview AssessmentSM -- Narrative Report for Case Study #4 -- Chapter 19 Case Study #5 -- A Mock Interview -- Topic 1 -- Topic 2 -- Topic 3 -- Topic 2 -- Topic 3 -- Topic 4 -- Topic 3 -- Topic 4 -- Topic 4 -- Topic 3 -- Topic 4 (Narrative Summary) -- Topic 3 -- Topic 4 -- Topic 2 -- Topic 4 (Narrative Summary) -- Topic 5 -- Efficacy of Eyewitness Interview AssessmentSM -- Narrative Report for Case Study #5 -- Section VII: Expectations -- Chapter 20 Expectations and Future Research -- Appendix A: Category of Comments and Questions -- Appendix B: Sample Mindful Interview Method Script -- Appendix C: Forensic Art Indexing -- Appendix D: List of All Case Studies -- Appendix E: Case Study Transcripts and Efficacy of Eyewitness Interview Assessment Reports -- Bibliography -- Index…”
    eBook