Skip to main content

Securing The Internet Of Things

In Order to Read Online or Download Securing The Internet Of Things Full eBooks in PDF, EPUB, Tuebl and Mobi you need to create a Free account. Get any books you like and read everywhere you want. Fast Download Speed ~ Commercial & Ad Free. We cannot guarantee that every book is in the library!

Securing the Internet of Things

Securing the Internet of Things Book
Author : Shancang Li,Li Da Xu
Publisher : Syngress
Release : 2017-01-11
ISBN : 0128045051
Language : En, Es, Fr & De

GET BOOK

Book Description :

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things. Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT Contributed material by Dr. Imed Romdhani

Securing the Internet of Things Concepts Methodologies Tools and Applications

Securing the Internet of Things  Concepts  Methodologies  Tools  and Applications Book
Author : Management Association, Information Resources
Publisher : IGI Global
Release : 2019-09-06
ISBN : 1522598677
Language : En, Es, Fr & De

GET BOOK

Book Description :

The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.

Practical Internet of Things Security

Practical Internet of Things Security Book
Author : Brian Russell,Drew Van Duren
Publisher : Packt Publishing Ltd
Release : 2016-06-29
ISBN : 1785880292
Language : En, Es, Fr & De

GET BOOK

Book Description :

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world About This Book Learn to design and implement cyber security strategies for your organization Learn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystem Learn best practices to secure your data from device to the cloud Gain insight into privacy-enhancing techniques and technologies Who This Book Is For This book targets IT Security Professionals and Security Engineers (including pentesters, security architects and ethical hackers) who would like to ensure security of their organization's data when connected through the IoT. Business analysts and managers will also find it useful. What You Will Learn Learn how to break down cross-industry barriers by adopting the best practices for IoT deployments Build a rock-solid security program for IoT that is cost-effective and easy to maintain Demystify complex topics such as cryptography, privacy, and penetration testing to improve your security posture See how the selection of individual components can affect the security posture of the entire system Use Systems Security Engineering and Privacy-by-design principles to design a secure IoT ecosystem Get to know how to leverage the burdgening cloud-based systems that will support the IoT into the future. In Detail With the advent of Intenret of Things (IoT), businesses will be faced with defending against new types of threats. The business ecosystem now includes cloud computing infrastructure, mobile and fixed endpoints that open up new attack surfaces, a desire to share information with many stakeholders and a need to take action quickly based on large quantities of collected data. . It therefore becomes critical to ensure that cyber security threats are contained to a minimum when implementing new IoT services and solutions. . The interconnectivity of people, devices, and companies raises stakes to a new level as computing and action become even more mobile, everything becomes connected to the cloud, and infrastructure is strained to securely manage the billions of devices that will connect us all to the IoT. This book shows you how to implement cyber-security solutions, IoT design best practices and risk mitigation methodologies to address device and infrastructure threats to IoT solutions. This book will take readers on a journey that begins with understanding the IoT and how it can be applied in various industries, goes on to describe the security challenges associated with the IoT, and then provides a set of guidelines to architect and deploy a secure IoT in your Enterprise. The book will showcase how the IoT is implemented in early-adopting industries and describe how lessons can be learned and shared across diverse industries to support a secure IoT. Style and approach This book aims to educate readers on key areas in IoT security. It walks readers through engaging with security challenges and then provides answers on how to successfully manage IoT security and build a safe infrastructure for smart devices. After reading this book, you will understand the true potential of tools and solutions in order to build real-time security intelligence on IoT networks.

Securing the IoT Introduction

Securing the IoT  Introduction Book
Author : Lisa Bock
Publisher : Unknown
Release : 2017
ISBN : 0987650XXX
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download Securing the IoT Introduction book written by Lisa Bock, available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Security Challenges and Approaches in Internet of Things

Security Challenges and Approaches in Internet of Things Book
Author : Sridipta Misra,Muthucumaru Maheswaran,Salman Hashmi
Publisher : Springer
Release : 2016-09-09
ISBN : 9783319442297
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Ubiquitous Computing and Computing Security of IoT

Ubiquitous Computing and Computing Security of IoT Book
Author : N. Jeyanthi,Ajith Abraham,Hamid Mcheick
Publisher : Springer
Release : 2018-10-03
ISBN : 3030015661
Language : En, Es, Fr & De

GET BOOK

Book Description :

This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.

Securing the Internet of Things An End to End Strategy Guide for Product and Service Security

Securing the Internet of Things  An End to End Strategy Guide for Product and Service Security Book
Author : Don Bailey
Publisher : McGraw-Hill Education
Release : 2016-09-30
ISBN : 9781259588280
Language : En, Es, Fr & De

GET BOOK

Book Description :

Develop, deploy, and administer an effective security framework for IoT-oriented products and services Securing the Internet of Things: A Practical Guide to Architecting, Implementing, and Managing IoT Product and Service Security lays out end-to-end IoT security strategies. You will learn how to vastly improve your organization’s security posture and minimize the potential long-term costs that result from inadequate security. This practical resource fully explains existing product and service models common to the IoT landscape and teaches, step-by-step, the process of evaluating IoT security risks from both an architectural and component perspective. The book clearly explains how to identify and prioritize risks that affect both organizations and end users. You will discover how to build an IoT security framework, develop accurate threat models, detect and block malicious activity, and securely manage unmanned systems. · Shows how to manage devices and detect bad actors · Features instructions for setting up a personal IoT lab environment · Written by a recognized information security expert who regularly speaks at industry events

Practical Industrial Internet of Things Security

Practical Industrial Internet of Things Security Book
Author : Sravani Bhattacharjee
Publisher : Packt Publishing Ltd
Release : 2018-07-30
ISBN : 1788830857
Language : En, Es, Fr & De

GET BOOK

Book Description :

Skillfully navigate through the complex realm of implementing scalable, trustworthy industrial systems and architectures in a hyper-connected business world. Key Features Gain practical insight into security concepts in the Industrial Internet of Things (IIoT) architecture Demystify complex topics such as cryptography and blockchain Comprehensive references to industry standards and security frameworks when developing IIoT blueprints Book Description Securing connected industries and autonomous systems is a top concern for the Industrial Internet of Things (IIoT) community. Unlike cybersecurity, cyber-physical security is an intricate discipline that directly ties to system reliability as well as human and environmental safety. Practical Industrial Internet of Things Security enables you to develop a comprehensive understanding of the entire spectrum of securing connected industries, from the edge to the cloud. This book establishes the foundational concepts and tenets of IIoT security by presenting real-world case studies, threat models, and reference architectures. You’ll work with practical tools to design risk-based security controls for industrial use cases and gain practical know-how on the multi-layered defense techniques including Identity and Access Management (IAM), endpoint security, and communication infrastructure. Stakeholders, including developers, architects, and business leaders, can gain practical insights in securing IIoT lifecycle processes, standardization, governance and assess the applicability of emerging technologies, such as blockchain, Artificial Intelligence, and Machine Learning, to design and implement resilient connected systems and harness significant industrial opportunities. What you will learn Understand the crucial concepts of a multi-layered IIoT security framework Gain insight on securing identity, access, and configuration management for large-scale IIoT deployments Secure your machine-to-machine (M2M) and machine-to-cloud (M2C) connectivity Build a concrete security program for your IIoT deployment Explore techniques from case studies on industrial IoT threat modeling and mitigation approaches Learn risk management and mitigation planning Who this book is for Practical Industrial Internet of Things Security is for the IIoT community, which includes IIoT researchers, security professionals, architects, developers, and business stakeholders. Anyone who needs to have a comprehensive understanding of the unique safety and security challenges of connected industries and practical methodologies to secure industrial assets will find this book immensely helpful. This book is uniquely designed to benefit professionals from both IT and industrial operations backgrounds.

Securing the Internet of Things with Security by Contract

Securing the Internet of Things with Security by Contract Book
Author : Anonim
Publisher : Unknown
Release : 2021
ISBN : 0987650XXX
Language : En, Es, Fr & De

GET BOOK

Book Description :

Download Securing the Internet of Things with Security by Contract book written by , available in PDF, EPUB, and Kindle, or read full book online anywhere and anytime. Compatible with any devices.

Orchestrating and Automating Security for the Internet of Things

Orchestrating and Automating Security for the Internet of Things Book
Author : Anthony Sabella,Rik Irons-Mclean,Marcelo Yannuzzi
Publisher : Cisco Press
Release : 2018-06-04
ISBN : 0134756916
Language : En, Es, Fr & De

GET BOOK

Book Description :

Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. · Understand the challenges involved in securing current IoT networks and architectures · Master IoT security fundamentals, standards, and modern best practices · Systematically plan for IoT security · Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks · Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions · Implement platform security services including identity, authentication, authorization, and accounting · Detect threats and protect data in IoT environments · Secure IoT in the context of remote access and VPNs · Safeguard the IoT platform itself · Explore use cases ranging from smart cities and advanced energy systems to the connected car · Preview evolving concepts that will shape the future of IoT security

Information Security Theory and Practice Securing the Internet of Things

Information Security Theory and Practice  Securing the Internet of Things Book
Author : David Naccache,Damien Sauveron
Publisher : Springer
Release : 2014-06-25
ISBN : 3662438267
Language : En, Es, Fr & De

GET BOOK

Book Description :

This volume constitutes the refereed proceedings of the 8th IFIP WG 11.2 International Workshop on Information Security Theory and Practices, WISTP 2014, held in Heraklion, Crete, Greece, in June/July 2014. The 8 revised full papers and 6 short papers presented together with 2 keynote talks were carefully reviewed and selected from 33 submissions. The papers have been organized in topical sections on cryptography and cryptanalysis, smart cards and embedded devices, and privacy.

Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things Book
Author : Charles A. Kamhoua,Laurent L. Njilla,Alexander Kott,Sachin Shetty
Publisher : John Wiley & Sons
Release : 2020-06-11
ISBN : 1119593395
Language : En, Es, Fr & De

GET BOOK

Book Description :

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things Book
Author : Charles A. Kamhoua,Laurent L. Njilla,Alexander Kott,Sachin Shetty
Publisher : John Wiley & Sons
Release : 2020-08-04
ISBN : 1119593360
Language : En, Es, Fr & De

GET BOOK

Book Description :

An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Internet of Things Security Fundamentals Techniques and Applications

Internet of Things Security  Fundamentals  Techniques and Applications Book
Author : Weippl, Edgar
Publisher : River Publishers
Release : 2018-08-15
ISBN : 8793609531
Language : En, Es, Fr & De

GET BOOK

Book Description :

Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them. Internet of Things Security: Fundamentals, Techniques and Applications provides a comprehensive overview of the overall scenario of IoT Security whilst highlighting recent research and applications in the field. Technical topics discussed in the book include: Machine-to-Machine CommunicationsIoT ArchitectureIdentity of ThingsBlockchainParametric CryptosystemSoftware and Cloud Components

Securing the IoT Introduction

Securing the IoT  Introduction Book
Author : Anonim
Publisher : Unknown
Release : 2017
ISBN : 0987650XXX
Language : En, Es, Fr & De

GET BOOK

Book Description :

Learn about securing the Internet of Things. Explore the types of IoT devices designed to improve the quality of life in homes and businesses, discover how to design IoT security, and more.

IoT Security

IoT Security Book
Author : Madhusanka Liyanage,An Braeken,Pardeep Kumar,Mika Ylianttila
Publisher : John Wiley & Sons
Release : 2020-01-28
ISBN : 1119527929
Language : En, Es, Fr & De

GET BOOK

Book Description :

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

The IoT Architect s Guide to Attainable Security and Privacy

The IoT Architect s Guide to Attainable Security and Privacy Book
Author : Damilare D. Fagbemi,David M Wheeler,JC Wheeler
Publisher : CRC Press
Release : 2019-10-08
ISBN : 1000762610
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book describes how to architect and design Internet of Things (loT) solutions that provide end-to-end security and privacy at scale. It is unique in its detailed coverage of threat analysis, protocol analysis, secure design principles, intelligent loT's impact on privacy, and the effect of usability on security. The book also unveils the impact of digital currency and the dark web on the loT-security economy. It's both informative and entertaining. "Filled with practical and relevant examples based on years of experience ... with lively discussions and storytelling related to loT security design flaws and architectural issues."— Dr. James F. Ransome, Senior Director of Security Development Lifecycle (SOL) Engineering, Intel 'There is an absolute treasure trove of information within this book that will benefit anyone, not just the engineering community. This book has earned a permanent spot on my office bookshelf."— Erv Comer, Fellow of Engineering, Office of Chief Architect Zebra Technologies 'The importance of this work goes well beyond the engineer and architect. The IoT Architect's Guide to Attainable Security & Privacy is a crucial resource for every executive who delivers connected products to the market or uses connected products to run their business."— Kurt Lee, VP Sales and Strategic Alliances at PWNIE Express "If we collectively fail to follow the advice described here regarding loT security and Privacy, we will continue to add to our mounting pile of exploitable computing devices. The attackers are having a field day. Read this book, now."— Brook S.E. Schoenfield, Director of Advisory Services at IOActive, previously Master Security Architect at McAfee, and author of Securing Systems

IoT Security

IoT Security Book
Author : Madhusanka Liyanage,An Braeken,Pardeep Kumar,Mika Ylianttila
Publisher : John Wiley & Sons
Release : 2019-12-24
ISBN : 1119527945
Language : En, Es, Fr & De

GET BOOK

Book Description :

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

Green Internet of Things Sensor Networks

Green Internet of Things Sensor Networks Book
Author : Adamu Murtala Zungeru,Joseph M. Chuma,Caspar K. Lebekwe,Pendukeni Phalaagae,Jwaone Gaboitaolelwe
Publisher : Springer
Release : 2020-10-15
ISBN : 9783030549824
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book presents methods for advancing green IoT sensor networks and IoT devices. Three main methods presented are: a standalone system to support IoT devices that is informed by the amount of energy the solar array system can produce; a model of securing a building's main power supply against unauthorized use; and security of the IoT devices and their networks. For each, the authors outline the methods, presents security and privacy issues, and their solutions. The work suggests a layered approach to expose security issues and challenges at each layer of the IoT architecture and proposes techniques used to mitigate these challenges. Finally, perspectives are drawn and discussed for future directions in securing IoT sensor networks, covering evolving areas such as artificial intelligence, blockchain technology, sensor Internet of People, context-aware sensing, cloud infrastructure, security and privacy, and the Internet of Everything.

Securing IoT and Big Data

Securing IoT and Big Data Book
Author : Vijayalakshmi Saravanan,Alagan Anpalagan,T. Poongodi,Firoz Khan
Publisher : CRC Press
Release : 2020-12-17
ISBN : 100025853X
Language : En, Es, Fr & De

GET BOOK

Book Description :

This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems. It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion of both areas. Real case applications from different industries are offering to facilitate ease of understanding the approach. The book goes on to address the significance of security algorithms in combing IoT and big data which is currently evolving in communication technologies. The book is written for researchers, professionals, and academicians from interdisciplinary and transdisciplinary areas. The readers will get an opportunity to know the conceptual ideas with step-by-step pragmatic examples which makes ease of understanding no matter the level of the reader.