Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cloud computing 1,800
- Development 393
- Application software 370
- Amazon Web Services (Firm) 252
- Computer networks 236
- Management 230
- Web services 228
- Examinations 220
- Security measures 216
- Information technology 166
- Certification 159
- Computer security 150
- Electronic data processing personnel 144
- Windows Azure 139
- Database management 111
- Artificial intelligence 107
- Microsoft Azure (Computing platform) 107
- Big data 103
- Electronic data processing 103
- Machine learning 100
- Web applications 100
- Data processing 97
- Engineering & Applied Sciences 96
- Computer Science 83
- Computer programs 82
- Computer software 82
- Open source software 76
- Internet of things 66
- Application program interfaces (Computer software) 62
- Distributed processing 61
-
2361Publicado 2022“…The book begins with a brief discussion of cloud computing and an introduction to Java support on Azure. …”
Libro electrónico -
2362Publicado 2021“…The technological revolution and medical advances made by combining vast quantities of available data, cloud computing services, and AI-based solutions can provide expert insight and analysis on a mass scale and at a relatively low cost. …”
Libro electrónico -
2363Publicado 2023“…Manufacturers are integrating new technologies, including the Internet of Things (IoT), cloud computing and analytics, and artificial intelligence and machine learning, into their production facilities throughout their operations. …”
Libro electrónico -
2364por Fornasiero, RosannaTabla de Contenidos: “…Fusion of IoT and Blockchain (BIoT): A Novel Architecture for Smart Agri culture -- Smart Chapeau for Visually Impaired Person -- Exploring The Impact Of Cloud Computing On Mobile Application Development -- Active Machine-to-Machine(M2M) and IoT Communication Architecture for Mobile Devices and Sensor Nodes -- rought Prediction in Agriculture with Support Vector Neural Networks: Enhancing Accuracy -- lockchain-based Anomaly Detection and Intrusion Prevention in IoT Net works -- Performance of Machine Learning Algorithms in Big Data Analytics -- Machine Learning and IoT Based Efficient Power Conservation System for Smart Buildings -- An Assessment on Algorithms for Planning of Secondary Distribution with Renewable Energy -- A Novel Heart disease Monitoring and Prediction using Machine Learning Algorithm -- An Efficient Quadrature LEACH Routing Protocol with Enhanced FODPSO Optimization in WSN -- A Multihop Routing Protocol in Wireless Sensor Networks using Graph based Cat Salp Swarm Algorithm -- Level Monitoring of Cylindrical Two-tank System using IoT -- Numerical Simulation for Effect of Varying Materials on Performance En hancement of Earth Tube Heat Exchanger -- Advancements in Hand Gesture Recognition through Convolutional Neural Networks: A Comprehensive Study -- An intelligent feature extraction and multiple learning based classification techniques for diagnosis of breast cancer -- AI and Robotics: Humanity’s New Frontier -- IoT - based Safety Jacket System for Mining Professionals -- Predictive Web Prefetching: A Combined Approach Using Clustering Algo rithms and WEKA in High-Traffic Settings -- Advancements in Imaging Techniques for Accurate Identification of VCF in Patients with Scoliosis -- l Distance domination in semigraph -- Behavioral Aspects of 2.5 GHz in an Indoor Environment -- An Experimental Study of Stone Matrix Asphalt with Different Fillers -- SMACO Program execution on new simulator using new in-structions -- Blockchain-Based System for Virtual Power Plants: Enhancing Efficiency and Security in Operations and Transactions -- Netflix Data Analysis using EDA -- Analysis of the impact of machine learning on the development of the strate gic business model by analysing the customer’s opinions and demands -- Medical Chabot using Machine Learning -- Microcontroller Based Smart Automated Public Gar Den Maintainace System -- Optimizing Intrusion Detection Systems Using Deep Learning and Genetic Algorithms for Network Traffic Analysis -- Semantic Segmentation of Natural Scene Images using Encoder-Decoder Ap proach -- Investigation of an Architecture for Convolutional Neural Network with Ef ficient Resource Utilization -- IoT-Enabled Smart Helmet: Enhancing Safety for Motorcycle Riders through Alcohol, Drowsiness, and Helmet Detection -- Design of H-shaped slotted Microstrip Patch Antenna at 28 GHz for 5G Communication -- Design of Compact Wideband Microstrip Patch Antenna for IoT Applica tions in WLAN, Wi-Max, C-Band -- Design and Analysis of Dual AlN/SiN passivation layer for mitigation of Self-Heating in HEMTs -- Design, Simulation and Optimization of Extended Interaction Cavities for a C Band Multi-beam High Efficiency Klystron -- Performance Comparision of Different Digital Image Filters Used for Biomedical Signals…”
Publicado 2024
Libro electrónico -
2365Publicado 2012Tabla de Contenidos: “…; THE UK INDUSTRY PULSE ON GREEN IT AND CARBON EMISSIONS; THE ARGUMENT FOR GREENING THE COMPANY; GREEN IT STRATEGY; THE MISSING PIECE; 2 CLOUD COMPUTING, BPM AND GOING GREEN; CYNICAL GREEN; SHOW ME THE GREEN; COMMITTED GREEN; BIG GREEN; 3 BLUEPRINT FOR GREEN IT; POWER CUTS; DATA CENTRES; 4 ACCOUNTING FOR CARBON IN YOUR GREEN IT STRATEGY; MEASUREMENT OF ELECTRICITY CONSUMPTION AND CARBON EMISSIONS; OTHER SOURCES OF IT-RELATED CARBON EMISSIONS; HOLISTIC MANAGEMENT OF IT EMISSIONS; COST-BENEFIT CASE…”
Libro electrónico -
2366Publicado 2018Tabla de Contenidos: “…Continuous integration -- Deployment -- Continuous deployment -- Continuous delivery -- Build and deployment pipeline -- Release -- Prerequisites for successful RESTful services deployments -- The Azure environment -- Cloud computing -- The benefits of the cloud -- Cloud-computing service models -- Discussing the Azure environment -- Starting with Azure -- Publishing/hosting -- Project hosting -- The dashboard -- Code -- Work -- Adding code to the repository -- Test -- Creating a test plan -- Creating test cases -- Running manual tests -- Wiki -- Build and Release tab -- CI versus CD -- CI and CD using TFS online -- Initiating the CD release process -- Summary -- Chapter 8: Securing RESTful Web Services -- OWASP security standards -- Securing RESTful web services -- The vulnerable areas of an unsecured web application -- Cross-site scripting attacks -- SQL injection attacks -- What is cooking here? …”
Libro electrónico -
2367Publicado 2023Tabla de Contenidos: “…3.7 Given a scenario, install and replace the printer consumables -- Chapter 4: Virtualization and Cloud Computing -- Introduction -- Practice Exam Questions -- 4.1 Summarize cloud computing concepts -- 4.2 Summarize aspects of client-side virtualization -- Chapter 5: Hardware and Network Troubleshooting -- Introduction -- Practice Exam Questions -- 5.1 Given a scenario, apply the best-practice methodology to resolve the problem -- 5.2 Given a scenario, troubleshoot problems related to motherboards, RAM, CPU, and power -- 5.3 Given a scenario, troubleshoot and diagnose problems with storage drives and RAID arrays -- 5.4 Given a scenario, troubleshoot video, projector, and display issues -- 5.5 Given a scenario, troubleshoot common issues with mobile devices -- 5.6 Given a scenario, troubleshoot and resolve printer issues -- 5.7 Given a scenario, troubleshoot problems with wired and wireless networks -- Chapter 6: Mock Exam: Core 1 (220-1101) -- Chapter 7: Operating Systems -- Introduction -- Practice Exam Questions -- 7.1 Identify basic features of Microsoft Windows editions -- 7.2 Given a scenario, use the appropriate Microsoft command-line tool -- 7.3 Given a scenario, use features and tools of the Microsoft Windows 10 operating system (OS) -- 7.4 Given a scenario, use the appropriate Microsoft Windows 10 Control Panel utility -- 7.5 Given a scenario, use the appropriate Windows settings -- 7.6 Given a scenario, configure Microsoft Windows networking features on a client/desktop -- 7.7 Given a scenario, apply application installation and configuration concepts -- 7.8 Explain common OS types and their purposes -- 7.9 Given a scenario, perform OS installations and upgrades in a diverse OS environment -- 7.10 Identify common features and tools of the macOS/desktop OS -- 7.11 Identify common features and tools of the Linux client/desktop OS…”
Libro electrónico -
2368Publicado 2016Tabla de Contenidos: “…Internet of Things -- Consistent User Experience Across Devices -- Cloud Computing -- Big Data Analytics -- Artificial Intelligence -- Business Benefits and Risks -- New Security Capabilities -- Baseline Security -- Protected Environments -- Encryption -- Hardware Acceleration -- Enhanced Recovery -- AI-Based Security and Automation -- Context-Aware Security -- Cloud Security and Context Awareness -- Security Analytics and Data Protection -- Conclusion -- Chapter 9: Corporate Social Responsibility: The Ethics of Managing Information Risk -- The Expanding Scope of Corporate Social Responsibility -- The Evolution of Technology and Its Impact -- Maintaining Society's Trust -- The Ethics of Managing Information Risk -- Conclusion -- Chapter 10: The 21st Century CISO -- Chief Trust Officer -- The Z-Shaped Individual -- Foundational Skills -- Becoming a Storyteller -- Fear Is Junk Food -- Accentuating the Positive -- Demonstrating the Reality of Risk -- The CISO's Sixth Sense -- Taking Action at the Speed of Trust -- The CISO as a Leader -- Learning from Other Business Leaders -- Voicing Our Values -- Discussing Information Risk at Board Level -- Conclusion -- Chapter 11: Performance Coaching -- How to Use the Tables -- Independence and Initiative -- Efficiency and Effectiveness -- Commitment -- Professionalism -- Discipline -- Teamwork -- Problem-Solving -- Communication -- Listening -- Style -- Clarity -- Goal-Setting -- Conclusion -- Appendix A -- Index…”
Libro electrónico -
2369Publicado 2018Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Dedication -- Packt Upsell -- Contributors -- Table of Contents -- Preface -- Chapter 1: The Basics of Networking with AWS -- Introducing cloud computing -- Regions and Availability Zones -- Security and compliance -- Amazon Elastic Compute Cloud -- Security groups -- An overview of networking services -- Amazon Virtual Private Cloud -- Amazon CloudFront -- Amazon Route 53 -- AWS Direct Connect -- Elastic Load Balancing -- Auto Scaling -- Billing Dashboard -- AWS Total Cost of Ownership (TCO) Calculator -- A sample architecture - compute and networking services -- Summary -- Chapter 2: Amazon VPC -- Creating and configuring the VPC -- Creating a VPC using a wizard -- Scenario 1 - VPC with a single public subnet -- Scenario 2 - VPC with public and private subnets -- Scenario 3 - VPC with public and private subnets and hardware VPN access -- Scenario 4 - VPC with a private subnet only and hardware VPN access -- Creating a VPC without using the wizard -- Creating instances in a VPC -- Summary -- Chapter 3: Elastic Load Balancing -- An overview of ELB -- Creating and configuring an ELB -- Accessing the instance remotely using PuTTY -- Summary -- Chapter 4: Auto Scaling -- An overview of Auto Scaling -- Types of Auto Scaling -- Setting up Auto Scaling in a load balanced application -- Amazon Machine Image -- Launch configuration -- Auto Scaling group -- Summary -- Chapter 5: Amazon Route 53 -- Overview of Amazon Route 53 concepts -- Configuring Amazon Route 53 -- Configuring Route 53 for a web application -- Configuring health checks on Route 53 -- Creating a CNAME resource record set -- Summary -- Chapter 6: AWS Direct Connect -- Introducing AWS Direct Connect -- An overview of AWS Direct Connect components -- Summary -- Chapter 7: Security Best Practices -- The shared responsibility model…”
Libro electrónico -
2370Publicado 2012Tabla de Contenidos: “…Moving a Processing Element from Hot to Cool Spots: Is This an Efficient Method to Decrease Leakage Power Consumption in FPGAs?; 9. Cloud Computing - a Greener Future for IT; 10. Energy-Efficient Management of Campus PCs; Part II: Focus on Wireless Communications; 11. …”
Libro electrónico -
2371Publicado 2023Tabla de Contenidos: “…. -- The Second Workplace Revolution: Cloud Computing -- Covid-19 and the Third Workplace Revolution: Hybrid Work -- Endnotes -- Chapter 2 Why a Culture of Belonging Is Key in Hybrid Work -- Building Belonging Is Harder in Hybrid Work -- Belonging Boosts Performance, Engagement, and Well-being -- Fostering Belonging Is Key in Hybrid Work -- Endnotes -- Chapter 3 The Four-Pillar Framework -- Chapter 4 Pillar I: Create a Unified Hybrid Leadership Team -- Introduction -- Using Values to Unify -- Role Modelling and Setting the Tone -- Setting Common Goals -- Creating Opportunities to Co-Lead -- Schedule Informal Time -- Set Up Non-Work-Related Spaces -- Host Virtual Breakfasts, Lunches, and Coffee Breaks -- Host Group Learning Sessions -- Conclusion -- Endnotes -- Chapter 5 Pillar II: Build Extreme Transparency -- Introduction -- Attract and Retain Transparent People -- Encourage Leaders to Embrace Social Media -- Promote Open Communication -- Create a Flatter Organization -- Create Employee-to-Leadership Communication Channels -- Conclusion -- Endnotes -- Chapter 6 Pillar III: Overcommunicate Through All Channels -- Introduction -- Assess Your Communication Channels -- Schedule Strategic Regular Meetings -- Choosing the Right Meeting Cadence -- Setting up Cadence Meetings With Direct Reports -- Setting up Cadence Meetings for Your Team -- Cultivate Empathy and Appreciation in Communication -- Co-create a New Communication Framework -- Communicate With Equity and Inclusion in Mind -- Conclusion -- Endnotes -- Chapter 7 Pillar IV: Unify Cross-Cultural Hybrid Teams Through Cultural Awareness -- Introduction…”
Libro electrónico -
2372Publicado 2023Tabla de Contenidos: “…Prem Laxman Das -- Analysis of quantum computing with food processing use case / Dhaval S Jha, Het Shah and Jai Prakash Verma -- Security of modern networks and its challenges / Apurv Garg, Bhartendu Sharma, Anmol Gupta and Rijwan Khan -- Security and performance analysis of advanced metering infrastructure in smart grid and use of blockchain in security perspective / Khushboo Gupta and Vinod Kumar -- Computation and storage efficient key distribution protocol for secure multicast communication in centralized environments / Vinod Kumar, Khushboo Gupta, Om Pal, Rajendra Kumar, Pradeep Kumar Tiwari, Narendra Kumar Updhyay and Mukesh Kumar Bhardwaj -- Effective key agreement protocol for large and dynamic groups using elliptic curve cryptography / Vinod Kumar, Khushboo Gupta, Om Pal, Shiv Prakash, Pravin Kumar, Shiv Veer Singh, Pradeep Kumar Tiwari and Animesh Tripathi -- Cyber security using artificial intelligence / Sapna Katiyar -- Cloud computing : an overview of security risk assessment models & frameworks / Subarna Ghosh, Nafees Mansoor and Mohammad Shahriar Rahman -- Generating cyber threat intelligence to discover potential security threats using classification and topic modeling / Md Imran Hossen, Ashraful Islam, Farzana Anowar, Eshtiak Ahmed and Mohammed Masudur Rahman -- Cyber-physical energy systems security : attacks, vulnerabilities and risk management / Sayada Sonia Akter, Rezwan Ahmed, Ferdous Hasan Khan and Mohammad Shahriar Rahman -- Intrusion detection using machine learning / Rijwan Khan, Aditi Tiwari, Aashna Kapoor and Abhyudaya Mittal -- Network forensic / Sandeep Kaur, Manjit Sandhu, Sandeep Sharma and Ravinder Singh Sawhney -- A deep neural network based biometric random key generator for security -- enhancement / Sannidhan M S, Jason Elroy Martis and Sudeepa K B -- Quantum computing and its real-world applications / Pawan Mishra, Ravi Kamal Pandey and Pooja -- Encrypted network traffic classification and application identification employing deep learning / Jyoti Mishra and Mahendra Tiwari…”
Libro electrónico -
2373Publicado 2024Tabla de Contenidos: “…Chapter 38 Comprehensive Exploration of Sustainable Cloud Computing, its Underlying Challenges, and Synergy With Explainable AI…”
Libro electrónico -
2374Publicado 2022“…New technologies such as machine learning, image processing, big data, remote monitoring, cloud computing, deep learning, and enhanced wireless communications are all improving and connecting modern healthcare services and products through IoT. https://www.juniperresearch.com/press/press-releases/iot-platform-revenue-to-grow-20-in-2020"--…”
Libro electrónico -
2375Publicado 2022“…It exemplifies the potential of evolutionary computation for the next generation and the role of cloud computing in shaping Society 5.0. It also provides insight into various platforms, paradigms, techniques, and tools used in diverse fields.This book appeals to a variety of readers such as academicians, researchers, research scholars, and postgraduates…”
Libro electrónico -
2376Publicado 2022Tabla de Contenidos: “…6.6 Fractal Antennas -- 6.6.1 Minkowski Fractal Geometries Using Wearable Electro-Textile Antennas -- 6.6.2 Antenna Design With Defected Semi-Elliptical Ground Plane -- 6.6.3 Double-Fractal Layer Wearable Antenna -- 6.6.4 Development of Embroidered Sierpinski Carpet Antenna -- 6.7 Future Challenges of Wearable Antenna Designs -- 6.8 Conclusion -- References -- 7 An Overview of IoT and Its Application With Machine Learning in Data Center -- 7.1 Introduction -- 7.1.1 6LoWPAN -- 7.1.2 Data Protocols -- 7.1.2.1 CoAP -- 7.1.2.2 MQTT -- 7.1.2.3 Rest APIs -- 7.1.3 IoT Components -- 7.1.3.1 Hardware -- 7.1.3.2 Middleware -- 7.1.3.3 Visualization -- 7.2 Data Center and Internet of Things -- 7.2.1 Modern Data Centers -- 7.2.2 Data Storage -- 7.2.3 Computing Process -- 7.2.3.1 Fog Computing -- 7.2.3.2 Edge Computing -- 7.2.3.3 Cloud Computing -- 7.2.3.4 Distributed Computing -- 7.2.3.5 Comparison of Cloud Computing and Fog Computing -- 7.3 Machine Learning Models and IoT -- 7.3.1 Classifications of Machine Learning Supported in IoT -- 7.3.1.1 Supervised Learning -- 7.3.1.2 Unsupervised Learning -- 7.3.1.3 Reinforcement Learning -- 7.3.1.4 Ensemble Learning -- 7.3.1.5 Neural Network -- 7.4 Challenges in Data Center and IoT -- 7.4.1 Major Challenges -- 7.5 Conclusion -- References -- 8 Impact of IoT to Meet Challenges in Drone Delivery System -- 8.1 Introduction -- 8.1.1 IoT Components -- 8.1.2 Main Division to Apply IoT in Aviation -- 8.1.3 Required Field of IoT in Aviation -- 8.2 Literature Survey -- 8.3 Smart Airport Architecture -- 8.4 Barriers to IoT Implementation -- 8.4.1 How is the Internet of Things Converting the Aviation Enterprise? …”
Libro electrónico -
2377Publicado 2023Tabla de Contenidos: “…2.7 Role of 5G for Transit Operations -- 2.8 Role of 5G in Advanced Driver Assistance Systems (ADAS) -- 2.9 Role of 5G in Logistics Operations -- 2.10 Summary -- References -- Chapter 3 Network Management in Smart Cities -- 3.1 Introduction -- 3.2 Forensics -- 3.2.1 Digital Device Forensics -- 3.2.2 Other Digital Forensics -- 3.2.3 The Need for IoT Forensics -- 3.3 Challenges in IoT Forensics -- 3.3.1 General Issues -- 3.3.2 Evidence Identification, Collection, and Preservation -- 3.3.3 Evidence Analysis and Correlation -- 3.3.4 Presentation -- 3.4 Opportunities of IoT Forensics -- 3.5 Cloud Computing Security -- 3.5.1 Effectively Manage Identities -- 3.5.2 Key Concerns about Cloud Computing -- 3.5.3 Trends in Big Data as an Enabling Technology -- 3.6 Smart Cities -- 3.6.1 Smart City Concept -- 3.6.2 Cloud Computing Benefits in the Context of Smart City -- 3.7 Smarter Grid -- 3.8 Smart Home -- 3.9 Smart City Data Plan Challenges -- 3.9.1 Compatibility between Smart City Devices -- 3.9.2 Simplicity -- 3.9.3 Mobility and Geographic Control -- 3.10 Software-Defined Network-Based Smart City Network Management -- 3.10.1 Centralized Control -- 3.10.2 Simplicity and Inerrability -- 3.10.3 Virtualization -- 3.10.4 Compatibility -- 3.10.5 Challenges of SDN in Smart City Applications -- 3.11 Software-Defined Things Framework -- 3.11.1 Reactive Smart City Device Management -- 3.11.2 Smart Mobility and Smart Traffic Management -- 3.11.3 Smart Environment -- 3.11.4 Security -- 3.11.5 Advanced Optical Network Architecture for Next-Generation Internet Access -- 3.12 Conclusion and Future Work -- References -- Chapter 4 Energy-Efficient Reinforcement Learning in Wireless Sensor Networks Using 5G for Smart Cities -- 4.1 Introduction -- 4.1.1 Problem Statement -- 4.1.2 Objectives -- 4.2 Literature Review -- 4.2.1 Wireless Sensor Network…”
Libro electrónico -
2378por Young, MarcusTabla de Contenidos: “…Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Introduction; Introduction to AWS; Cloud computing service models; Infrastructure as a Service; Platform as a Service; Software as a Service; Benefits of moving to the cloud; Common problems encountered at AWS; Underlying hardware failures; Over-provisioning; Under-provisioning; Replication; Redundancy; Improving the end-user experience; Monitoring and log-gathering; Summary; Chapter 2: Basic Patterns; Introducing Vagrant; Snapshot pattern; Stamp pattern; Scale up pattern…”
Publicado 2015
Libro electrónico -
2379Publicado 2023Tabla de Contenidos: “…-- Common Vulnerabilities -- Digital Espionage -- Stolen Credentials -- Malware -- Network-Based Attacks -- Cloud Computing and Digital Security -- Summary -- Exam Essentials -- Review Questions -- Chapter 3: Controlling Access to Your Assets -- Controlling Physical Access -- Controlling Network Access -- Controlling Software Sources -- Summary -- Exam Essentials -- Review Questions -- Chapter 4: Controlling Network Connections -- Understanding Network Architecture -- Auditing Networks -- Securing Networks -- Summary -- Exam Essentials -- Review Questions -- Chapter 5: Encrypting Your Data at Rest -- What Is Encryption? …”
Libro electrónico -
2380Publicado 2018Tabla de Contenidos: “…Intro -- Foreword -- Contents -- Part I Join the Geo Revolution -- The Changing Landscape of Geospatial Information Markets -- Introduction -- Rise of the Platforms -- Data as a Service -- Open Data Policies -- New Business Models -- Sensor Use Growing -- Crowdsourcing -- Disruptive Innovation -- Cloud Computing -- Business Models in Cloud Computing -- Microsoft Azure -- Amazon Web Services (AWS) -- Google Cloud Platform -- Conclusion -- References -- The Digital Transformation of Education -- Case Study: How the World Bank Group's Open Learning Campus is Partnering with Earth Observation Satellite Data to Enrich the Learning Experience -- -- Learning as an Accelerator to Achieve Development Goals -- Progress of the OLC so Far -- Flexible Pathways to Learning -- Increasing Importance of Geospatial Data -- Examples of How the OLC is Incorporating Spatial Data -- Issues Relevant to This Experience for the Earth Observation Community -- Case Study Conclusion -- References -- The Open Science Commons for the European Research Area -- Creating the European Research Area: The "Open" Approach -- Problems to Solve -- Lack and/or Incomplete Roadmaps for Research- and e-Infrastructures -- Fragmented Solutions and Policies for Access to Data and Knowledge -- Insufficient Cooperation Between Public and Private Sector -- Lack of National and European Organization Between All Stakeholders -- Many Providers Without a Single Market -- The Open Science Commons -- The European Open Science Cloud -- Open Science Commons for the EOSC -- EOSC Architecture and Services -- Realizing a Federated Approach to Research Data -- Offering of Scalable Access to and Analysis of Research Data for Reuse -- Integrating (Shared) Tools and Applications -- Provisioning of Services for Depositing Data for Resource-Bound Users -- EOSC Service Integration and Management…”
Libro electrónico