Mostrando 6,921 - 6,940 Resultados de 14,132 Para Buscar '"FEDER"', tiempo de consulta: 0.13s Limitar resultados
  1. 6921
    Publicado 2019
    Tabla de Contenidos: “…List of Contributors xix -- Preface xxiii -- Acknowledgments xxvii -- Part I Foundations 1 -- 1 Internet of Things (IoT) and New Computing Paradigms 3 / Chii Chang, Satish Narayana Srirama, and Rajkumar Buyya -- 1.1 Introduction 3 -- 1.2 Relevant Technologies 6 -- 1.3 Fog and Edge Computing Completing the Cloud 8 -- 1.3.1 Advantages of FEC: SCALE 8 -- 1.3.2 How FEC AchievesThese Advantages: SCANC 9 -- 1.4 Hierarchy of Fog and Edge Computing 13 -- 1.5 Business Models 16 -- 1.6 Opportunities and Challenges 17 -- 1.7 Conclusions 20 -- References 21 -- 2 Addressing the Challenges in Federating Edge Resources 25 / Ahmet Cihat Baktir, Cagatay Sonmez, CemErsoy, Atay Ozgovde, and Blesson Varghese -- 2.1 Introduction 25 -- 2.2 The Networking Challenge 27 -- 2.3 The Management Challenge 34 -- 2.4 Miscellaneous Challenges 40 -- 2.5 Conclusions 45 -- References 45 -- 3 Integrating IoT + Fog + Cloud Infrastructures: System Modeling and Research Challenges 51 / Guto Leoni Santos,Matheus Ferreira, Leylane Ferreira, Judith Kelner, Djamel Sadok, Edison Albuquerque, Theo Lynn, and Patricia Takako Endo -- 3.1 Introduction 51 -- 3.2 Methodology 52 -- 3.3 Integrated C2F2T Literature by Modeling Technique 55 -- 3.4 Integrated C2F2T Literature by Use-Case Scenarios 65 -- 3.5 Integrated C2F2T Literature by Metrics 68 -- 3.6 Future Research Directions 72 -- 3.7 Conclusions 73 -- Acknowledgments 74 -- References 75 -- 4 Management and Orchestration of Network Slices in 5G, Fog, Edge, and Clouds 79 / Adel Nadjaran Toosi, RedowanMahmud, Qinghua Chi, and Rajkumar Buyya -- 4.1 Introduction 79 -- 4.2 Background 80 -- 4.3 Network Slicing in 5G 83 -- 4.4 Network Slicing in Software-Defined Clouds 87 -- 4.5 Network Slicing Management in Edge and Fog 91 -- 4.6 Future Research Directions 93 -- 4.7 Conclusions 96 -- Acknowledgments 96 -- References 96 -- 5 Optimization Problems in Fog and Edge Computing 103 / Zoltán Ádám Mann -- 5.1 Introduction 103 -- 5.2 Background / RelatedWork 104.…”
    Libro electrónico
  2. 6922
    Publicado 2017
    Tabla de Contenidos: “…. -- Chapter 5: Working with Ceph Object Storage Multi-Site v2 -- Introduction -- Functional changes from Hammer federated configuration -- RGW multi-site v2 requirement -- Installing the Ceph RGW multi-site v2 environment -- How to do it... -- Configuring Ceph RGW multi-site v2 -- How to do it... -- Configuring a master zone -- Configuring a secondary zone -- Checking the synchronization status -- Testing user, bucket, and object sync between master and secondary sites -- How to do it... -- Chapter 6: Working with the Ceph Filesystem -- Introduction -- Understanding the Ceph Filesystem and MDS -- Deploying Ceph MDS -- How to do it... -- Accessing Ceph FS through kernel driver -- How to do it... -- Accessing Ceph FS through FUSE client -- How to do it... -- Exporting the Ceph Filesystem as NFS -- How to do it... -- Ceph FS - a drop-in replacement for HDFS -- Chapter 7: Monitoring Ceph Clusters -- Introduction -- Monitoring Ceph clusters - the classic way…”
    Libro electrónico
  3. 6923
    Publicado 2013
    Tabla de Contenidos: “…(b) Negative Outcomes of a Culture Operating without Integrity -- (c) Appropriately Handling an Integrity Failure -- (d) Integrity and the WAM‐Pro -- NOTES -- UNIT THREE Timekeeping -- CHAPTER FIVE Workforce Management Devices and Functionality -- 5.1 TIMECARD FUNCTIONALITY -- (a) Time Record Views -- (b) Timecard Edits and Entries -- (c) Timecard Reports -- (d) Advanced Timecard Functionality -- (e) Pay Rules -- (f) Timecard Functionality beyond Straight Timekeeping -- 5.2 ACCRUAL RULES -- 5.3 AUTOMATED WORKFLOW AND EMPLOYEE SELF‐SERVICE -- (a) Benefits of Workforce Management Automated Workflows and Employee Self‐Service Tools -- (b) Functionality of Automated Workflow System -- (c) Considerations When Planning an Automated Workflow Process -- 5.4 DATA COLLECTION: WHO, WHERE, AND WHEN -- (a) After Hours: Moving beyond Timekeeping -- (b) Data Collection Technologies -- (c) Fixed-Location Data Collection -- (d) Mobile Data Collection -- (e) Push and Poll: Integrating Data into Time Management Systems -- (f) The Future -- 5.5 BIOMETRICS: FEATURES AND FUNCTIONALITY -- (a) Common Challenges of Biometric Systems -- (b) Common Benefits of Biometric Systems -- (c) Common Pitfalls of Biometric Systems -- 5.6 MOBILE RESOURCE MANAGEMENT: FEATURES AND FUNCTIONALITY -- (a) Benefits of Using Mobile Resource Management -- (b) Challenges and Issues When Using Mobile Resource Management -- (c) Big Picture for the Employee and the Employer -- NOTES -- CHAPTER SIX Federal Regulation -- 6.1 FAIR LABOR STANDARDS ACT -- (a) Overtime Requirements and Regular Rate of Pay -- (b) Payments Covering More than One Workweek -- 6.2 DEFINING THE LEGAL WORKWEEK -- (a) Public Sector Employee Workweek -- (b) Healthcare Industry -- (c) Agricultural Employees -- (d) Transportation Workers -- 6.3 CHANGING THE WORKWEEK -- (a) Nonemployees or Independent Contractors…”
    Libro electrónico
  4. 6924
    Publicado 2004
    Tabla de Contenidos: “…Fundamental concepts in Process Integration -- 2.1 The need for a unifying technique -- 2.1.1 Similarities between intra- and inter-enterprise integration -- 2.1.2 Summary -- 2.2 Process Integration concepts and notations -- 2.2.1 Collaboration and Interaction -- 2.2.2 Connectors and Adapters -- 2.2.3 Classification of interaction between sub-systems -- 2.3 QoS capabilities framework -- 2.3.1 Operability -- 2.3.2 Availability -- 2.3.3 Federation -- 2.3.4 Performance -- 2.3.5 Security -- 2.3.6 Standards compliance -- 2.3.7 Transactionality -- 2.4 Application patterns for Application Integration -- 2.5 Application patterns for Extended Enterprise -- 2.6 Summary -- Chapter 3. …”
    Libro electrónico
  5. 6925
    Publicado 2017
    Tabla de Contenidos: “…Census Bureau -- CIA World Factbook -- External datasets - economic -- Organization for Economic Cooperation and Development (OECD) -- Federal Reserve Economic Data (FRED) -- Summary -- Chapter 8: Communicating with Others - Visualization and Dashboarding -- Common mistakes when designing visuals -- The Hierarchy of Questions method -- The Hierarchy of Questions method overview -- Developing question trees -- Pulling together the data -- Aligning views with question flows -- Designing visual analysis for IoT data -- Using layout positioning to convey importance -- Use color to highlight important data -- The impact of using a single color to communicate importance -- Be consistent across visuals -- Make charts easy to interpret -- Creating a dashboard with Tableau -- The dashboard walk-through -- Hierarchy of Questions example -- Aligning visuals to the thought process -- Creating individual views -- Assembling views into a dashboard -- Creating and visualizing alerts -- Alert principles -- Organizing alerts using a Tableau dashboard -- Summary -- Chapter 9: Applying Geospatial Analytics to IoT Data -- Why do you need geospatial analytics for IoT? …”
    Libro electrónico
  6. 6926
    Publicado 2011
    Tabla de Contenidos: “…5 Migrating from Legacy SharePoint to SharePoint Server 2010 -- Formulating a Migration Strategy -- Planning for an Upgrade to SharePoint 2010 -- Examining SharePoint 2010 Migration Paths -- Performing an In-Place Upgrade of a SharePoint Environment -- Performing a Database Attach Upgrade -- Using Visual Upgrade -- Summary -- Best Practices -- Part II: Administering and Maintaining SharePoint Server 2010 -- 6 Managing and Administering SharePoint 2010 Infrastructure -- Operations Management with the SharePoint Central Administration Tool -- Administering Site Collections and Sites -- Using Additional Administration Tools for SharePoint -- Summary -- Best Practices -- 7 Leveraging PowerShell for Command-Line SharePoint Administration and Automation -- Understanding Windows PowerShell Concepts -- SharePoint Administration with PowerShell -- Cataloging the Best Scripts to Automate SharePoint Administration -- Understanding Advanced PowerShell Topics -- Beyond Built-In SharePoint PowerShell Cmdlets -- Summary -- Best Practices -- 8 Leveraging and Optimizing Search in SharePoint 2010 -- Outlining the Capabilities of SharePoint 2010 Search -- Deploying a Native SharePoint 2010 Search Service Application -- Define Content Sources -- Search Scopes -- Federating Search -- Keywords and Best Bets -- Customizing the Search User Interface -- Installing FAST Search Server 2010 for SharePoint -- Deploying FAST Search Service Applications -- Customizing the FAST Search User Interface -- Uninstalling FAST Search Server 2010 for SharePoint -- Summary -- Best Practices -- 9 Managing and Maintaining SQL Server in a SharePoint Environment -- Monitoring SQL Server in a SharePoint Environment -- Maintaining SQL Server in a SharePoint Environment -- Managing SharePoint Content Databases -- Externalizing BLOB Storage in SharePoint 2010 -- Summary -- Best Practices…”
    Libro electrónico
  7. 6927
    por Dance, Beverly
    Publicado 2023
    Tabla de Contenidos: “…The Worker Adjustment and Retraining Notification Act (WARN) (1988) -- 6. For Federal Government Employees -- 6.1. The Civil Service Reform Act (1978) -- 6.2. …”
    Libro electrónico
  8. 6928
    por Wahli, Ueli
    Publicado 2005
    Tabla de Contenidos: “…Web services standards -- Categorization of Web services standards -- Core standards -- SOAP: Simple Object Access Protocol -- WSDL: Web Services Description Language -- UDDI: Universal Description, Discovery, and Integration -- XML -- Description and discovery -- WS-Inspection: Web Services Inspection Language (WSIL) -- WS-Discovery -- WS-MetadataExchange -- WS-Policy -- WS-PolicyAssertions -- WS-PolicyAttachement -- DNS Endpoint Discovery (DNS-EPD) -- Messaging -- ASAP: Asynchronous Services Access Protocol -- SOAP Messages with Attachments (SwA) -- SOAP Message Transmission Optimization Mechanism -- WS-Addressing -- WS-Notification -- WS-Eventing -- WS-Enumeration -- WS-MessageDelivery -- WS-Reliability -- WS-ReliableMessaging -- WS-Resources -- WS-Transfer -- Management -- WSDM: Web Services Distributed Management -- WS-Manageability -- SPML: Service Provisioning Markup Language -- WS-Provisioning -- Business processes -- BPEL: Business Process Execution Language -- WS-CDL -- WS-CAF -- Transactions -- WS-Coordination (WS-COOR) -- WS-Transaction -- WS-AtomicTransaction (WS-AT) -- WS-BusinessActivity (WS-BA) -- Security -- XML-Encryption -- XML-Signature -- WS-Security -- WS-SecureConversation -- WS-SecurityPolicy -- WS-Trust -- WS-Federation -- SAML: Security Assertion Markup Language -- User experience -- WSRP: Web Services for Remote Portlets -- J2EE 1.4 and Java JSRs…”
    Libro electrónico
  9. 6929
    Publicado 2017
    Tabla de Contenidos: “…Cover -- Notation -- Preface -- Contents -- About the Author -- Part One: Background -- Chapter 1 Computer and Network Security Concepts -- 1.1 Computer Security Concepts -- 1.2 The OSI Security Architecture -- 1.3 Security Attacks -- 1.4 Security Services -- 1.5 Security Mechanisms -- 1.6 Fundamental Security Design Principles -- 1.7 Attack Surfaces and Attack Trees -- 1.8 A Model for Network Security -- 1.9 Standards -- 1.10 Key Terms, Review Questions, and Problems -- Chapter 2 Introduction to Number Theory -- 2.1 Divisibility and the Division Algorithm -- 2.2 The Euclidean Algorithm -- 2.3 Modular Arithmetic -- 2.4 Prime Numbers -- 2.5 Fermat's and Euler's Theorems -- 2.6 Testing for Primality -- 2.7 The Chinese Remainder Theorem -- 2.8 Discrete Logarithms -- 2.9 Key Terms, Review Questions, and Problems -- Appendix 2A The Meaning of Mod -- Part Two: Symmetric Ciphers -- Chapter 3 Classical Encryption Techniques -- 3.1 Symmetric Cipher Model -- 3.2 Substitution Techniques -- 3.3 Transposition Techniques -- 3.4 Rotor Machines -- 3.5 Steganography -- 3.6 Key Terms, Review Questions, and Problems -- Chapter 4 Block Ciphers and the Data Encryption Standard -- 4.1 Traditional Block Cipher Structure -- 4.2 The Data Encryption Standard -- 4.3 A DES Example -- 4.4 The Strength of DES -- 4.5 Block Cipher Design Principles -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Finite Fields -- 5.1 Groups -- 5.2 Rings -- 5.3 Fields -- 5.4 Finite Fields of the Form GF(p) -- 5.5 Polynomial Arithmetic -- 5.6 Finite Fields of the Form GF(2n) -- 5.7 Key Terms, Review Questions, and Problems -- Chapter 6 Advanced Encryption Standard -- 6.1 Finite Field Arithmetic -- 6.2 AES Structure -- 6.3 AES Transformation Functions -- 6.4 AES Key Expansion -- 6.5 An AES Example -- 6.6 AES Implementation -- 6.7 Key Terms, Review Questions, and Problems -- Appendix 6A Polynomials with Coefficients in GF(28) -- Chapter 7 Block Cipher Operation -- 7.1 Multiple Encryption and Triple DES -- 7.2 Electronic Codebook -- 7.3 Cipher Block Chaining Mode -- 7.4 Cipher Feedback Mode -- 7.5 Output Feedback Mode -- 7.6 Counter Mode -- 7.7 XTS-AES Mode for Block-Oriented Storage Devices -- 7.8 Format-Preserving Encryption -- 7.9 Key Terms, Review Questions, and Problems -- Chapter 8 Random Bit Generation and Stream Ciphers -- 8.1 Principles of Pseudorandom Number Generation -- 8.2 Pseudorandom Number Generators -- 8.3 Pseudorandom Number Generation Using a Block Cipher -- 8.4 Stream Ciphers -- 8.5 RC4 -- 8.6 True Random Number Generators -- 8.7 Key Terms, Review Questions, and Problems -- Part Three: Asymmetric Ciphers 283 -- Chapter 9 Public-Key Cryptography and RSA -- 9.1 Principles of Public-Key Cryptosystems -- 9.2 The RSA Algorithm -- 9.3 Key Terms, Review Questions, and Problems -- Chapter 10 Other Public-Key Cryptosystems -- 10.1 Diffie-Hellman Key Exchange -- 10.2 Elgamal Cryptographic System -- 10.3 Elliptic Curve Arithmetic -- 10.4 Elliptic Curve Cryptography -- 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher -- 10.6 Key Terms, Review Questions, and Problems -- Part Four: Cryptographic Data Integrity Algorithms -- Chapter 11 Cryptographic Hash Functions -- 11.1 Applications of Cryptographic Hash Functions -- 11.2 Two Simple Hash Functions -- 11.3 Requirements and Security -- 11.4 Hash Functions Based on Cipher Block Chaining -- 11.5 Secure Hash Algorithm (SHA) -- 11.6 SHA-3 -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Message Authentication Codes -- 12.1 Message Authentication Requirements -- 12.2 Message Authentication Functions -- 12.3 Requirements for Message Authentication Codes -- 12.4 Security of MACs -- 12.5 MACs Based on Hash Functions: HMAC -- 12.6 MACs Based on Block Ciphers: DAA and CMAC -- 12.7 Authenticated Encryption: CCM and GCM -- 12.8 Key Wrapping -- 12.9 Pseudorandom Number Generation Using Hash Functions and MACs -- 12.10 Key Terms, Review Questions, and Problems -- Chapter 13 Digital Signatures -- 13.1 Digital Signatures -- 13.2 Elgamal Digital Signature Scheme -- 13.3 Schnorr Digital Signature Scheme -- 13.4 NIST Digital Signature Algorithm -- 13.5 Elliptic Curve Digital Signature Algorithm -- 13.6 RSA-PSS Digital Signature Algorithm -- 13.7 Key Terms, Review Questions, and Problems -- Part Five: Mutual Trust -- Chapter 14 Key Management and Distribution -- 14.1 Symmetric Key Distribution Using Symmetric Encryption -- 14.2 Symmetric Key Distribution Using Asymmetric Encryption -- 14.3 Distribution of Public Keys -- 14.4 X.509 Certificates -- 14.5 Public-Key Infrastructure -- 14.6 Key Terms, Review Questions, and Problems -- Chapter 15 User Authentication -- 15.1 Remote User-Authentication Principles -- 15.2 Remote User-Authentication Using Symmetric Encryption -- 15.3 Kerberos -- 15.4 Remote User-Authentication Using Asymmetric Encryption -- 15.5 Federated Identity Management -- 15.6 Personal Identity Verification -- 15.7 Key Terms, Review Questions, and Problems -- Part Six: Network And Internet Security -- Chapter 16 Network Access Control and Cloud Security -- 16.1 Network Access Control -- 16.2 Extensible Authentication Protocol -- 16.3 IEEE 802.1X Port-Based Network Access Control -- 16.4 Cloud Computing -- 16.5 Cloud Security Risks and Countermeasures -- 16.6 Data Protection in the Cloud -- 16.7 Cloud Security as a Service -- 16.8 Addressing Cloud Computing Security Concerns -- 16.9 Key Terms, Review Questions, and Problems -- Chapter 17 Transport-Level Security -- 17.1 Web Security Considerations -- 17.2 Transport Layer Security -- 17.3 HTTPS -- 17.4 Secure Shell (SSH) -- 17.5 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Network Security -- 18.1 Wireless Security -- 18.2 Mobile Device Security -- 18.3 IEEE 802.11 Wireless LAN Overview -- 18.4 IEEE 802.11i Wireless LAN Security -- 18.5 Key Terms, Review Questions, and Problems -- Chapter 19 Electronic Mail Security -- 19.1 Internet Mail Architecture -- 19.2 Email Formats -- 19.3 Email Threats and Comprehensive Email Security -- 19.4 S/MIME -- 19.5 Pretty Good Privacy -- 19.6 DNSSEC -- 19.7 DNS-Based Authentication of Named Entities -- 19.8 Sender Policy Framework -- 19.9 DomainKeys Identified Mail -- 19.10 Domain-Based Message Authentication, Reporting, and Conformance -- 19.11 Key Terms, Review Questions, and Problems -- Chapter 20 IP Security -- 20.1 IP Security Overview -- 20.2 IP Security Policy -- 20.3 Encapsulating Security Payload -- 20.4 Combining Security Associations -- 20.5 Internet Key Exchange -- 20.6 Cryptographic Suites -- 20.7 Key Terms, Review Questions, and Problems -- APPENDICES 696 -- Appendix A Projects for Teaching Cryptography and Network Security -- A.1 Sage Computer Algebra Projects -- A.2 Hacking Project -- A.3 Block Cipher Projects -- A.4 Laboratory Exercises -- A.5 Research Projects -- A.6 Programming Projects -- A.7 Practical Security Assessments -- A.8 Firewall Projects -- A.9 Case Studies -- A.10 Writing Assignments -- A.11 Reading/Report Assignments -- A.12 Discussion Topics -- Appendix B Sage Examples -- B.1 Linear Algebra and Matrix Functionality -- B.2 Chapter 2: Number Theory -- B.3 Chapter 3: Classical Encryption -- B.4 Chapter 4: Block Ciphers and the Data Encryption Standard -- B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields -- B.6 Chapter 6: Advanced Encryption Standard -- B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers -- B.8 Chapter 9: Public-Key Cryptography and RSA -- B.9 Chapter 10: Other Public-Key Cryptosystems -- B.10 Chapter 11: Cryptographic Hash Functions -- B.11 Chapter 13: Digital Signatures…”
    Libro electrónico
  10. 6930
    por Berk, Jonathan
    Publicado 2022
    Tabla de Contenidos: “…-- 1.2 The Four Types of Firms -- Sole Proprietorships -- Partnerships -- Limited Liability Companies -- Corporations -- Tax Implications for Corporate Entities -- Corporate Taxation Around the World -- 1.3 The Financial Manager -- Making Investment Decisions -- Global Financial Crisis The Dodd-Frank Act -- Making Financing Decisions -- Managing Short-Term Cash Needs -- The Goal of the Financial Manager -- Shareholder Value Versus Stakeholder Value -- 1.4 The Financial Manager's Place in the Corporation -- The Corporate Management Team -- Ethics and Incentives in Corporations -- Global Financial Crisis The Dodd-Frank Act on Corporate Compensation and Governance -- Citizens United v. Federal Election Commission -- 1.5 The Stock Market -- The Largest Stock Markets -- Primary Versus Secondary Markets -- Traditional Trading Venues -- Interview With Frank Hatheway -- New Competition and Market Changes -- Dark Pools -- Listing Standards -- Other Financial Markets -- NYSE, BATS, DJIA, S&amp -- P 500: Awash in Acronyms -- 1.6 Financial Institutions -- The Financial Cycle -- Types of Financial Institutions -- Role of Financial Institutions -- Summary -- Problems -- Chapter 2. …”
    Libro electrónico
  11. 6931
    Publicado 2023
    Tabla de Contenidos: “…Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: AWS Data Engineering Concepts and Trends -- Chapter 1: An Introduction to Data Engineering -- Technical requirements -- The rise of big data as a corporate asset -- The challenges of ever-growing datasets -- The role of the data engineer as a big data enabler -- Understanding the role of the data engineer -- Understanding the role of the data scientist -- Understanding the role of the data analyst -- Understanding other common data-related roles -- The benefits of the cloud when building big data analytic solutions -- Hands-on - creating and accessing your AWS account -- Creating a new AWS account -- Accessing your AWS account -- Summary -- Chapter 2: Data Management Architectures for Analytics -- Technical requirements -- The evolution of data management for analytics -- Databases and data warehouses -- Dealing with big, unstructured data -- Cloud-based solutions for big data analytics -- A deeper dive into data warehouse concepts and architecture -- Dimensional modeling in data warehouses -- Understanding the role of data marts -- Distributed storage and massively parallel processing -- Columnar data storage and efficient data compression -- Feeding data into the warehouse - ETL and ELT pipelines -- An overview of data lake architecture and concepts -- Data lake logical architecture -- The storage layer and storage zones -- Catalog and search layers -- Ingestion layer -- The processing layer -- The consumption layer -- Data lake architecture summary -- Bringing together the best of data warehouses and data lakes -- The data lake house approach -- New data lake table formats -- Federated queries across database engines -- Hands-on - using the AWS Command Line Interface (CLI) to create Simple Storage Service (S3) buckets -- Accessing the AWS CLI…”
    Libro electrónico
  12. 6932
    Publicado 2023
    Tabla de Contenidos: “…Types of blockchain dependent on network access -- Public blockchain -- Benefits of public blockchain -- Private blockchain -- Disadvantages of a private blockchain -- Consortium/federated blockchain -- Benefits of consortium blockchain -- Disadvantages of blockchain consortium -- Use cases of consortium blockchain -- Hybrid blockchain -- Advantages of hybrid blockchain…”
    Libro electrónico
  13. 6933
    por Morris, Tee
    Publicado 2024
    Tabla de Contenidos: “…-- The powers that be -- Federal Communications Commission (FCC) -- Recording Industry Association of America (RIAA) -- Electronic Frontier Foundation (EFF) -- Creative Commons (CC) -- I can name that tune . . . …”
    Libro electrónico
  14. 6934
    Publicado 1999
    Libro
  15. 6935
    Publicado 1980
    Libro
  16. 6936
  17. 6937
    Publicado 1994
    Revista
  18. 6938
    Publicado 1962
    Revista
  19. 6939
  20. 6940
    por Aguiar Júniar, Ruy Rosado de
    Publicado 2003
    Libro