Listing 1 - 10 of 16 << page
of 2
>>
Sort by

Book
Malware analysis and detection engineering : a comprehensive approach to detect and analyze modern malware
Authors: ---
ISBN: 1484261933 1484261925 Year: 2020 Publisher: New York : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. You will: Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative.


Book
Privacy and Identity Management. Time for a Revolution? : 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers
Authors: --- --- --- ---
ISBN: 3319417622 3319417630 9783319417622 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book contains a range of keynote papers and submitted papers presented at the 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, held in Edinburgh, UK, in August 2015. The 14 revised full papers included in this volume were carefully selected from a total of 43 submissions and were subject to a two-step review process. In addition, the volume contains 4 invited keynote papers. The papers cover a wide range of topics: cloud computing, privacy-enhancing technologies, accountability, measuring privacy and understanding risks, the future of privacy and data protection regulation, the US privacy perspective, privacy and security, the PRISMS Decision System, engineering privacy, cryptography, surveillance, identity management, the European General Data Protection Regulation framework, communicating privacy issues to the general population, smart technologies, technology users' privacy preferences, sensitive applications, collaboration between humans and machines, and privacy and ethics.


Book
Five technological forces disrupting security
Author:
ISBN: 0128050969 0128050950 9780128050965 9780128050958 Year: 2018 Publisher: Oxford, United Kingdom Cambridge, MA, United States

Loading...
Export citation

Choose an application

Bookmark

Abstract

The Five Technological Forces Disrupting Security: How Cloud, Social, Mobile, Big Data and IoT are Transforming Physical Security in the Digital Age explores the major technological forces currently driving digital disruption in the security industry, and what they foretell for the future. The book provides a high-level perspective on how the industry is changing as a whole, as well as practical guidance on how to incorporate these new technologies to create better security solutions. Explores the five major technological forces driving digital change in commercial security; Shows practitioners how to align security strategies with these inevitable changes; Examines how the consumerization of security will change the vendor playing field; Illustrates how security professionals can leverage these changes in their own careers; Provides an adoption scorecard that ranks trends and timeline for impact.

Keywords

Computer networks --- Computer security. --- Cloud computing --- Security measures. --- Electronic data processing --- Web services --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Distributed processing --- Protection --- Security measures --- Redes de ordenadores --- Medios sociales --- Informática en la nube, --- Datos masivos. --- Sistemas de comunicaciones móviles --- Medidas de seguridad --- Medidas de seguridad. --- Vehículos --- Sistemas móviles de comunicación --- Sistemas de comunicaciones inalámbricos --- Big Data --- Datos a gran escala --- Macrodatos --- Bases de datos --- Proceso de datos --- Seguridad de las redes de ordenadores --- Seguridad informática --- Cortafuegos (Seguridad informática) --- Sistemas de comunicación --- Online social networks --- Mobile computing --- Big data --- Context-aware computing --- Portable computers --- Electronic social networks --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Data sets, Large --- Large data sets --- Data sets --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Online communities (Online social networks)


Book
Information Security Theory and Practice : 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings
Authors: ---
ISBN: 3319459309 3319459317 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.


Book
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II
Authors: --- --- ---
ISBN: 3319457403 3319457411 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


Book
Computer Security – ESORICS 2016 : 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I
Authors: --- --- ---
ISBN: 3319457438 3319457446 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 9878 and 9879 constitutes the refereed proceedings of the 21st European Symposium on Research in Computer Security, ESORICS 2016, held in Heraklion, Greece, in September 2016. The 60 revised full papers presented were carefully reviewed and selected from 285 submissions. The papers cover a wide range of topics in security and privacy, including data protection: systems security, network security, access control, authentication, and security in such emerging areas as cloud computing, cyber-physical systems, and the Internet of Things.


Book
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II
Authors: --- ---
ISBN: 331998988X 3319989898 Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. .


Book
Computer Security : 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part I
Authors: --- ---
ISBN: 3319990721 331999073X Year: 2018 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018. The 56 revised full papers presented were carefully reviewed and selected from 283 submissions. The papers address issues such as software security, blockchain and machine learning, hardware security, attacks, malware and vulnerabilities, protocol security, privacy, CPS and IoT security, mobile security, database and web security, cloud security, applied crypto, multi-party computation, SDN security. .

Keywords

Computer science. --- Computer organization. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Computers and civilization. --- Law and legislation. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Computers and Society. --- Legal Aspects of Computing. --- Computer Systems Organization and Communication Networks. --- Information Systems and Communication Service. --- Civilization and computers --- Civilization --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Organization, Computer --- Informatics --- Science --- Protection --- Security measures --- Computer network architectures. --- Information systems. --- Cryptology. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Law and legislation --- Computer science --- Seguridad informática --- Criptografía


Book
Computer Security : ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers
Authors: --- --- --- --- --- et al.
ISBN: 3030127869 3030127850 Year: 2019 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018. The CyberICPS Workshop received 15 submissions from which 8 full papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 5 full papers out of 11 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling.

Keywords

Computer security. --- Computer crimes. --- Computers --- Computer network architectures. --- Software engineering. --- Systems and Data Security. --- Computer Crime. --- Legal Aspects of Computing. --- Computer Systems Organization and Communication Networks. --- Software Engineering. --- Information Systems Applications (incl. Internet). --- Law and legislation. --- Computer software engineering --- Engineering --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Cyberspace --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Computer privacy --- Computer system security --- Computer systems --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Law and legislation --- Protection --- Security measures --- Computer security --- Computers. --- Computer organization. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Organization, Computer --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Seguridad informática --- Delitos por ordenador


Book
The basics of IT audit : purposes, processes, and practical information
Authors: ---
ISBN: 0124171761 0124171591 9780124171763 9780124171596 Year: 2014 Publisher: Waltham, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Dependence on information technology (IT) is a characteristic common to virtually all modern organizations. Organizations rely on information, and the processes and enabling technology needed to use and effectively manage information. This reliance characterizes public and private sector organizations, regardless of mission, industry, geographic location, or organization type. IT is critical to organizational success, operating efficiency, competitiveness, and even survival, making imperative the need for organizations to ensure the correct and effective use of information technology. In this context it is important that resources are efficiently allocated, that IT functions at a sufficient level of performance and quality to effectively support the business, and that information assets are adequately secured consistent with the risk tolerance of the organization. Such assets must also be governed effectively, meaning that they operate as intended, work correctly, and function in a way that complies with applicable regulations and standards. IT auditing can help organizations achieve all of these objectives"--

Keywords

Information technology --- Computer security. --- Computer networks --- Auditing. --- Security measures. --- Information Technology --- General and Others --- IT (Information technology) --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Computer security --- Data protection --- Security systems --- Hacking --- information technology. --- information security. --- computer network. --- auditing. --- Buchprüfung --- auditeerimine --- verificatie van de rekeningen --- kontrola računa --- verifica dei conti --- audito atlikimas --- ревизия --- ревизија рачуна --- granskning av räkenskaper --- audit --- auditim (kontabilitet drejtimi) --- финансиска ревизија --- vérification des comptes --- verificação de contas --- εξέλεγξη λογαριασμών --- iniúchóireacht --- verificare a conturilor --- rewizja ksiąg --- auditēšana --- awditjar --- verificación de cuentas --- revidiranja --- varainkäytön valvonta --- kontrola účtov --- könyvvizsgálat --- revision af regnskaber --- έλεγχος λογαριασμών --- revize účtů --- revisione contabile dei conti --- účtovná revízia --- révision des comptes --- controllo dei conti --- elszámolások ellenőrzése --- проверка на сметководствена евиденција и финансиски извештаи --- controle van de rekeningen --- provjera računa --- censura de cuentas --- revisión de cuentas --- certificazione del bilancio --- auditare --- controlo das contas --- contrôle des comptes --- expertiză contabilă --- auditavimas --- éves beszámoló ellenőrzése --- regnskabskontrol --- Abschlussprüfung --- účtovný audit --- revisão de contas --- revize --- Prüfung des Jahresabschlusses --- revisione contabile --- auditálás --- räkenskapsrevision --- rețea de calculatoare --- računalniško omrežje --- počítačová síť --- рачунарска мрежа --- sieć informatyczna --- datoru tīkls --- počítačová sieť --- компјутерска мрежа --- δίκτυο πληροφορικής --- computernetwerk --- netwerk tal-kompjuter --- réseau informatique --- Informatiknetz --- datanet --- rrjet kompjuterik --- líonra ríomhairí --- rede informática --- red informática --- számítógépes hálózat --- datanätverk --- kompiuterių tinklas --- računalna mreža --- компютърна мрежа --- arvutivõrk --- rete informatica --- tietoverkko --- red de ordenadores --- réseau d'ordinateurs --- δίκτυο ηλεκτρονικών υπολογιστών --- datamaskinenetværk --- Computer-Verbundnetz --- informatikai hálózat --- rete di calcolatori --- мрежа за компјутерско поврзување --- μηχανογραφικό δίκτυο --- információbiztonság --- informationssikkerhed --- siguria informatike --- segurança da informação --- sikurezza tal-informazzjoni --- varovanje tajnosti podatkov --- Informationssicherheit --- bezpečnost informačních systémů --- informācijas drošība --- sicurezza delle informazioni --- informacijska sigurnost --- securitatea sistemelor informatice --- infoturve --- tietoturvallisuus --- информационна сигурност --- sécurité des systèmes d’information --- informationssäkerhet --- seguridad informática --- bezpieczeństwo informacji --- slándáil faisnéise --- информатичка безбедност --- informacijos saugumas --- ασφάλεια των συστημάτων πληροφοριών --- bezpečnosť informačných systémov --- informatiebeveiliging --- мрежова сигурност и сигурност в Интернет --- sécurité internet --- infrazzjoni tas-sigurtà tal-informazzjoni --- digital sikkerhed --- дигитална безбедност --- sigurtà tal-internet --- digitale beveiliging --- sikurezza diġitali --- интернетска безбедност --- kibernetska varnost --- zabezpečení informací --- network and Internet security --- parrezikshmëri dixhitale --- осигуреност на информацията --- cyberveiligheid --- kibernetinis saugumas --- informacijos saugumo užtikrinimas --- сигурност в Интернет --- segurança digital --- Infosec --- mbrojtje e informacionit --- digitalna varnost --- zabezpieczanie informacji --- digitālā drošība --- brud på informationssikkerheden --- sieťová a internetová bezpečnosť --- cibersegurança --- kršenje informacijske sigurnosti --- internetna varnost --- assurance de l’information --- Internet safety --- cibersecuritate --- seguridad digital --- securitate informatică --- incidente di sicurezza informatica --- sicurezza digitale --- garantía de la información --- cyberbeveiliging --- kybernetická bezpečnosť --- parrezikshmëria e internetit --- cyber-security --- sicurezza delle reti e dell'informazione --- internetveiligheid --- digitale Sicherheit --- asigurarea informației --- segurança das redes e da Internet --- безбедност на информациите --- cyber-securité --- sigurnost informacija --- verkkoturvallisuus --- událost v oblasti bezpečnosti informací --- цифрова безопасност --- parrezikshmëri kibernetike --- ασφάλεια στο διαδίκτυο --- ασφάλεια των πληροφοριών --- kybernetická bezpečnost --- informācijas drošības incidents --- internetsikkerhed --- information security incident --- cyber-safety --- internetbeveiliging --- incidente no domínio da segurança da informação --- kyberturvallisuus --- cybersicurezza --- internetsäkerhet --- sicurezza informatica --- incident informačnej bezpečnosti --- IT-beveiliging --- digitale veiligheid --- siguria e internetit --- inbreuk op de informatiebeveiliging --- porušení bezpečnosti informačních systémů --- informācijas aizsardzība --- cybersecurity --- кибербезопасност --- információbiztonsági esemény --- hálózatbiztonság --- kršitev varovanja tajnosti podatkov --- ráthú faisnéise --- segurança eletrónica --- naruszenie bezpieczeństwa informacji --- sécurité numérique --- garantia da informação --- informationssikring --- digital safety --- ασφάλεια στον κυβερνοχώρο  --- internetbiztonság --- net- og informationssikkerhed --- tietovarmuus --- tietojen turvaaminen --- breach of information security --- tīklu un informācijas drošība --- securitatea rețelelor și a internetului --- digitálna bezpečnosť --- inċident tas-sigurtà tal-informazzjoni --- kiberdrošība --- ИНФОСЕК --- кибербезбедност --- безбедност на компјутерски мрежи --- infosec --- vulnérabilitité des systèmes d'information --- garanzia di sicurezza delle informazioni --- informačná bezpečnosť --- INFOSEC --- IT-sikkerhed --- ψηφιακή ασφάλεια --- kiberbiztonság --- segurança da Web --- varnost omrežij in internetna varnost --- пробив в информационната сигурност --- SRRI --- cybersécurité --- küberjulgeolek --- cybersafety --- mrežna i internetska sigurnost --- tietoverkkoturvallisuus --- cybersäkerhet --- informatieborging --- interneto saugumas --- violazione della sicurezza delle informazioni --- interneto sauga --- περιστατικό ασφάλειας πληροφοριών --- sikurezza tal-internet --- INFOSEC  --- digitální bezpečnost --- incident glede varovanja tajnosti podatkov --- segurança cibernética --- incident de securitate cibernetică --- bezpieczeństwo cybernetyczne --- it-säkerhet --- informatiebeveiligingsincident --- shkelje e sigurisë informatike --- cibearshlándáil --- információbiztonsági incidens --- siguria e rrjetit dhe e internetit --- netwerk- en internetbeveiliging --- internetová bezpečnosť --- varnost na internetu --- Incident i sigurisë informatike --- sicurezza di Internet --- bezpieczeństwo cyfrowe --- încălcarea regulilor de securitate a sistemelor informatice --- informacijos saugumo incidentas --- violação da segurança da informação --- bezpieczeństwo w internecie --- sigurnost na internetu --- informationssikkerhedshændelse --- assikurazzjoni tal-informazzjoni --- netbiztonság --- internetová bezpečnost --- informācijas drošības pārkāpums --- NIS --- informacijos saugumo pažeidimas --- információbiztonság megsértése --- cyberbezpieczeństwo --- datasäkerhet --- Netz- und Informationssicherheit --- cybersikkerhed --- siguria kibernetike --- infokindlus --- zagotavljanje informacijske varnosti --- information assurance --- tīklu un interneta drošība --- infoturbeintsident --- kibernetička sigurnost --- parrezikshmëria kibernetike --- Informationssicherung --- sigurtà tan-netwerks u tal-internet --- bezpieczeństwo w sieci i internecie --- segurança informática --- Internetsicherheit --- interneta drošums --- porušenie bezpečnosti informačných systémov --- ciberseguridad --- digitális biztonság --- Cybersicherheit --- incydent związany z bezpieczeństwem informacji --- IT-Sicherheit --- interneta drošība --- Internet security --- InfoSec --- securitate cibernetică --- информациска безбедност --- informationssäkring --- segurança da Internet --- Informationstechnologie --- informaatioteknologia --- teknologjia e informacionit --- teicneolaíocht faisnéise --- infotehnoloogia --- tecnología de la información --- informatietechnologie --- tecnologia da informação --- informačná technológia --- информационна технология --- informationsteknologi --- teknoloġija tal-informazzjoni --- informācijas tehnoloģija --- technologie de l'information --- informační technologie --- tehnologia informației --- információtechnológia --- информатичка технологија --- информациона технологија --- informationsteknik --- τεχνολογία των πληροφοριών --- technologia informacyjna --- informacinė technologija --- tecnologia dell'informazione --- informacijska tehnologija --- sidetehnoloogia --- communications technology --- teknologji komunikacioni --- Kommunikationstechnologie --- Information and communication technologies --- technologie de la communication --- výpočetní technika --- komunikačná technológia --- komunikācijas tehnoloģijas --- informacijos technologija --- tehnologia comunicațiilor --- komunikační technologie --- technique de l'information --- ryšių priemonių technologija --- телекомуникациска технологија --- επικοινωνιακή τεχνολογία --- tecnologia da comunicação --- комуникациска технологија --- viestintäteknologia --- ICT --- tecnologia delle telecomunicazioni --- tecnologia delle comunicazioni --- informační technika --- tecnología de la comunicación --- obavijesna tehnologija --- kommunikationsteknologi --- communicatietechnologie --- τεχνική των πληροφοριών --- információs technológia --- vulnérabilité des systèmes d'information

Listing 1 - 10 of 16 << page
of 2
>>
Sort by