Inhaltsverzeichnis
Auswahl der wissenschaftlichen Literatur zum Thema „Cyber security management tool“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cyber security management tool" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Cyber security management tool"
Štitilis, Darius, Irmantas Rotomskis, Marius Laurinaitis, Sergiy Nadvynychnyy und Nadiya Khorunzhak. „National cyber security strategies: management, unification and assessment“. Independent Journal of Management & Production 11, Nr. 9 (01.11.2020): 2341. http://dx.doi.org/10.14807/ijmp.v11i9.1431.
Der volle Inhalt der QuelleFakiha, Bandr. „Business Organization Security Strategies to Cyber Security Threats“. International Journal of Safety and Security Engineering 11, Nr. 1 (28.02.2021): 101–4. http://dx.doi.org/10.18280/ijsse.110111.
Der volle Inhalt der QuelleСуворов, Александр, Aleksandr Suvorov, Мария Матанцева, Mariya Matanceva, Евгения Плотникова und Evgeniya Plotnikova. „Cyber Insurance as a Way of Cyber Risks Management“. Safety in Technosphere 7, Nr. 5 (19.11.2019): 35–42. http://dx.doi.org/10.12737/article_5d8b1f1205ad35.02378913.
Der volle Inhalt der QuelleSvilicic, Boris, Junzo Kamahara, Matthew Rooks und Yoshiji Yano. „Maritime Cyber Risk Management: An Experimental Ship Assessment“. Journal of Navigation 72, Nr. 5 (07.02.2019): 1108–20. http://dx.doi.org/10.1017/s0373463318001157.
Der volle Inhalt der QuelleKaragozlu, Damla. „Determination of cyber security ensuring behaviours of pre-service teachers“. Cypriot Journal of Educational Sciences 15, Nr. 6 (31.12.2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.
Der volle Inhalt der QuelleKachynskyi, A. B., und M. S. Stremetska. „Operational analytics as a data monitoring and event management tool of the cyber security management systems“. Reports of the National Academy of Sciences of Ukraine, Nr. 1 (Februar 2021): 9–16. http://dx.doi.org/10.15407/dopovidi2021.01.009.
Der volle Inhalt der QuelleRusso, Pietro, Alberto Caponi, Marco Leuti und Giuseppe Bianchi. „A Web Platform for Integrated Vulnerability Assessment and Cyber Risk Management“. Information 10, Nr. 7 (17.07.2019): 242. http://dx.doi.org/10.3390/info10070242.
Der volle Inhalt der QuelleAtoum, Issa, Ahmed Otoom und Amer Abu Ali. „A holistic cyber security implementation framework“. Information Management & Computer Security 22, Nr. 3 (08.07.2014): 251–64. http://dx.doi.org/10.1108/imcs-02-2013-0014.
Der volle Inhalt der QuellePavlík, Lukáš, Ekaterina Chytilová und Jarmila Zimmermannová. „Security Aspects of Healthcare Organization from the Perspective of Digitization of Facility Management“. WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 18 (25.01.2021): 360–66. http://dx.doi.org/10.37394/23207.2021.18.36.
Der volle Inhalt der QuelleComizio, V. Gerard, Behnam Dayanim und Laura Bain. „Cybersecurity as a global concern in need of global solutions: an overview of financial regulatory developments in 2015“. Journal of Investment Compliance 17, Nr. 1 (03.05.2016): 101–11. http://dx.doi.org/10.1108/joic-01-2016-0003.
Der volle Inhalt der QuelleDissertationen zum Thema "Cyber security management tool"
Strachová, Zuzana. „Implementace nástroje pro řízení kybernetické bezpečnosti“. Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444573.
Der volle Inhalt der QuellePech, Jan. „Aplikace zákona a vyhlášky o kybernetické bezpečnosti na úřadech státní správy“. Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-203989.
Der volle Inhalt der QuelleJohansson, Dan. „Empirical test of a tool for cyber security vulnerability assessment“. Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176032.
Der volle Inhalt der QuelleDenna rapport beskriver en studie vars mål var att verifiera ett modelleringsspråk för datasäkerhet vid namn Predictive, Probabilistic Cyber Security Modelling Language. Detta modelleringsspråk tillsammans med Enterprise Architecture Analysis Tool utgör ett verktyg för datasäkerhetsutvärderingar av systemarkitekturer. För att verifiera exaktheten och mognadsnivån på verktyget så skapades en generisk modell av ett verkligt Supervisory Control And Data Acquisition System-systems arkitektur. Denna modell utvärderades i ett senare skede. Utvärderingsprocessen bestod av ett Turingtest, som är samma metod som användes i en tidigare utvärdering av Predictive, Probabilistic Cyber Security Modelling Languages föregångare Cyber Security Modelling Language. För Turingtestet hölls fem intervjuer med domänexperter inom datasäkerhet. Fyra av dessa fick i uppgift att skapa attackvägar givet ett scenario i den modellerade systemarkitekturen. Attackvägarna som skapades sammanställdes i ett standardiserat formulär för den sista interna företagsexperten inom datasäkerhet att utvärdera. En expertutvärderare fick i uppgift att betygsätta de attackvägar som hade producerats av de fyra experterna och Predictive, Probabilistic Cyber Security Modelling Language. Betygsättningen baserades på hur sannolika de olika attackvägarna uppfattades av den interna experten. Slutsatsen som gjordes var att givet begränsningarna i studien, så producerade Predictive, Probabilistic Cyber Security Modelling Language en datasäkerhetsutvärdering som var likvärdigt sannolik jämfört med de som skapades av mänskliga experter. Resultaten som producerades var också konsistenta med resultaten som producerades av Predictive, Probabilistic Cyber Security Modelling Language föregångare Cyber Security Modelling Language i en tidigare studie. Förslag på kommande studier som skulle komplettera denna studie och stärka resultaten ytterligare introducerades också. Detta examensarbete var ett samarbete mellan ABB Enterprise Software och medlemmarna i teamet bakom Predictive, Probabilistic Cyber Security Modelling Language på ICS på KTH.
Moe, Lwin P. „Cyber security risk analysis framework : network traffic anomaly detection“. Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118536.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 84-86).
Cybersecurity is a growing research area with direct commercial impact to organizations and companies in every industry. With all other technological advancements in the Internet of Things (IoT), mobile devices, cloud computing, 5G network, and artificial intelligence, the need for cybersecurity is more critical than ever before. These technologies drive the need for tighter cybersecurity implementations, while at the same time act as enablers to provide more advanced security solutions. This paper will discuss a framework that can predict cybersecurity risk by identifying normal network behavior and detect network traffic anomalies. Our research focuses on the analysis of the historical network traffic data to identify network usage trends and security vulnerabilities. Specifically, this thesis will focus on multiple components of the data analytics platform. It explores the big data platform architecture, and data ingestion, analysis, and engineering processes. The experiments were conducted utilizing various time series algorithms (Seasonal ETS, Seasonal ARIMA, TBATS, Double-Seasonal Holt-Winters, and Ensemble methods) and Long Short-Term Memory Recurrent Neural Network algorithm. Upon creating the baselines and forecasting network traffic trends, the anomaly detection algorithm was implemented using specific thresholds to detect network traffic trends that show significant variation from the baseline. Lastly, the network traffic data was analyzed and forecasted in various dimensions: total volume, source vs. destination volume, protocol, port, machine, geography, and network structure and pattern. The experiments were conducted with multiple approaches to get more insights into the network patterns and traffic trends to detect anomalies.
by Lwin P. Moe.
S.M. in Engineering and Management
Ellithorpe, James O. „The Role and Impact of Cyber Security Mentoring“. Thesis, Walden University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10126660.
Der volle Inhalt der QuelleBusiness organizations are faced with an enormous challenge to improve cyber security, as breeches and lapses through firewalls are increasingly commonplace. The Chief Information Security Officer (CISO) and Information Technology (IT) staff are constantly challenged to identify and purge online and network structural weaknesses. The goal is to reduce overall business risk because unresolved risks are a constant concern to consumers who are uneasy about cyber security failures. The purpose of this general qualitative study was to examine the role and impact of Cyber Security Mentoring (CSM) from the perspectives of the workplace CISO, mentors, and protégés, who were randomly polled from various workplace settings across the United States. Mentoring allows IT staff members to learn from their CISOs and from workplace mentor mistakes and successes. Workplace IT staff are also closest to the various attack methodologies used by cyber hackers, and cohort and dyadic mentoring may provide insight into and responding to cyber-attacks and improving cyber defenses. Sixty-eight sets of respondent data relating to field experience, formal education, professional industry cyber security certifications, and mentoring were compared and examined between respondents. The goal was to determine where respondents agreed and disagreed on issues pertaining to cyber security and CSM. The findings suggested that CSM with a qualified mentor could improve cyber security in the workplace; in addition, more time must be devoted to continued professional education. Implications for positive social change included the use of CSM to enhance cyber security through the sharing of incidents, mindsets, procedures and expertise, and improvement of customer-consumer security confidence.
Cook, Kimberly Diane. „Effective Cyber Security Strategies for Small Businesses“. ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/3871.
Der volle Inhalt der QuelleSalim, Hamid M. „Cyber safety : a systems thinking and systems theory approach to managing cyber security risks“. Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90804.
Der volle Inhalt der QuelleThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2014.
93
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 148-156).
If we are to manage cyber security risks more effectively in today's complex and dynamic Web 2.0 environment, then a new way of thinking is needed to complement traditional approaches. According to Symantec's 2014 Internet Security Threat Report, in 2012 more than ten million identities that included real names, dates of birth, and social security were exposed by a single breach. In 2013 there were eight breaches that each exposed over ten million identities. These breaches were recorded despite the fact that significant resources are expended, on managing cyber security risks each year by businesses and governments. The objective of this thesis was twofold. The first objective was to understand why traditional approaches for managing cyber security risks were not yielding desired results. Second, propose a new method for managing cyber security risks more effectively. The thesis investigated widely used approaches and standards, and puts forward a method based on the premise that traditional technology centric approaches have become ineffective on their own. This lack of efficacy can be attributed primarily to the fact that, Web 2.0 is a dynamic and a complex socio-technical system that is continuously evolving. This thesis proposes a new method for managing cyber security risks based on a model for accident or incident analysis, used in Systems Safety field. The model is called System-Theoretic Accident Model and Processes (STAMP). It is rooted in Systems Thinking and Systems Theory. Based on a case study specifically written for this thesis, the largest cyber-attack reported in 2007 on a major US based retailer, is analyzed using the STAMP model. The STAMP based analysis revealed insights both at systemic and detailed level, which otherwise would not be available, if traditional approaches were used for analysis. Further, STAMP generated specific recommendations for managing cyber security risks more effectively.
by Hamid M. Salim.
S.M. in Engineering and Management
S.M.
Dutta, Saurabh. „Striking a balance between usability and cyber-security in IoT devices/“. Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/113508.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 67-74).
Today more and more physical objects are being connected to internet. The Internet of Things, or loT, is dramatically changing the way of living and the way we interact with things and each other. Home doors can be opened remotely with a watch, cars' performance can be upgraded remotely, devices monitor health and send updates to physicians remotely. loT technology has made some labor-intensive jobs simple and has the potential to simplify and enhance nearly every aspect of our lives. On the other hand, increased levels of high profile cyber security breaches in recent years have made it clear how important it is to make sure these devices are trustworthy and secure. While most users are aware of how critical it is to secure their laptops, mobile devices, and apps, due to the seamless ways in which loT devices integrates into our daily lives, users are often unaware of risks associated with them. At the same time, IoT device makers are aggressively releasing new products in a mad race to establish themselves in this emerging market. Increased pressure to differentiate on usability based functionalities has spurred products and features that are not properly vetted for security. Gartner predicts that by 2020, more than 25% of identified enterprise attacks will involve IoT, though loT will account for only 10% of IT security budgets. As loT continues to grow, vendors will favor usability over security and IT security practitioners remain unsure of the correct amount of acceptable risk.
by Saurabh Dutta.
S.M. in Engineering and Management
Sheen, Frank Jordan. „An Extensible Technology Framework for Cyber Security Education“. BYU ScholarsArchive, 2015. https://scholarsarchive.byu.edu/etd/4375.
Der volle Inhalt der QuelleReid, Rayne. „A brain-compatible approach to the presentation of cyber security educational material“. Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1019895.
Der volle Inhalt der QuelleBücher zum Thema "Cyber security management tool"
Cyber security essentials. Boca Raton: Auerbach Publications, 2010.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Audit report: The department's cyber security incident management capability. [Washington, DC: Office of Inspector General, Dept. of Energy, 2008.
Den vollen Inhalt der Quelle findenGustin, Joseph F. Cyber terrorism: A guide for facility managers. Lilburn, Ga: Fairmont Press, 2004.
Den vollen Inhalt der Quelle findenScott, Lynn M. Human capital management for the USAF cyber force. Santa Monica, CA: RAND Project Air Force, 2010.
Den vollen Inhalt der Quelle findenCyber challenges and national security: Threats, opportunities, and power in a virtual world. Washington, D.C: Georgetown University Press, 2012.
Den vollen Inhalt der Quelle findenUnited States. Dept. of Energy. Office of Audit Services. Management controls over the Federal Energy Regulatory Commission's unclassified cyber security program, 2006. Washington, D.C: U.S. Department of Energy, Office of Inspector General, 2006.
Den vollen Inhalt der Quelle findenCyber terrorism: Political and economic implications. Hershey, PA: Idea Group Pub., 2006.
Den vollen Inhalt der Quelle findenCriminal major case management: Persons of Interest Priority Assessment Tool (POIPAT). Boca Raton: Taylor & Francis, 2012.
Den vollen Inhalt der Quelle findenBuford, John F. Koegel. Cyber security, situation management, and impact assessment II and visual analytics for homeland defense and security II: 5 and 8-9 April 2010, Orlando, Florida, United States. Bellingham, Wash: SPIE, 2010.
Den vollen Inhalt der Quelle findenBuchteile zum Thema "Cyber security management tool"
Rajamäki, Jyri. „Cyber Security, Trust-Building, and Trust-Management: As Tools for Multi-agency Cooperation Within the Functions Vital to Society“. In Cyber-Physical Security, 233–49. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-32824-9_12.
Der volle Inhalt der QuelleAlsmadi, Izzat. „Cyber Security Management“. In The NICE Cyber Security Framework, 243–51. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_10.
Der volle Inhalt der QuelleBurghouwt, Pieter, Marinus Maris, Sjaak van Peski, Eric Luiijf, Imelda van de Voorde und Marcel Spruit. „Cyber Targets Water Management“. In Critical Information Infrastructures Security, 38–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-71368-7_4.
Der volle Inhalt der QuelleDavis, Robert E. „Security Governance Management“. In Auditing Information and Cyber Security Governance, 74–107. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003099673-3.
Der volle Inhalt der QuelleTawalbeh, Lo’ai. „Network Management“. In The NICE Cyber Security Framework, 99–115. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_5.
Der volle Inhalt der QuelleTawalbeh, Lo’ai. „Risk Management“. In The NICE Cyber Security Framework, 117–30. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_6.
Der volle Inhalt der QuelleAlsmadi, Izzat. „Software Management“. In The NICE Cyber Security Framework, 131–74. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_7.
Der volle Inhalt der QuelleAlsmadi, Izzat. „Identity Management“. In The NICE Cyber Security Framework, 313–29. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_12.
Der volle Inhalt der QuelleAlsmadi, Izzat. „Acquisition Management“. In The NICE Cyber Security Framework, 9–40. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-02360-7_2.
Der volle Inhalt der QuelleAlsmadi, Izzat. „Information Systems Security Management“. In The NICE Cyber Security Framework, 31–53. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-41987-5_2.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Cyber security management tool"
Ekstedt, Mathias, Pontus Johnson, Robert Lagerstrom, Dan Gorton, Joakim Nydren und Khurram Shahzad. „Securi CAD by Foreseeti: A CAD Tool for Enterprise Cyber Security Management“. In 2015 IEEE 19th International Enterprise Distributed Object Computing Workshop (EDOCW). IEEE, 2015. http://dx.doi.org/10.1109/edocw.2015.40.
Der volle Inhalt der QuelleAlmroth, Jonas, und Tommy Gustafsson. „CRATE Exercise Control – A cyber defense exercise management and support tool“. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE, 2020. http://dx.doi.org/10.1109/eurospw51379.2020.00014.
Der volle Inhalt der QuelleHuang, Yi, Jayanta Debnath, Michaela Iorga, Anup Kumar und Bin Xie. „CSAT: A User-interactive Cyber Security Architecture Tool based on NIST-compliance Security Controls for Risk Management“. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON). IEEE, 2019. http://dx.doi.org/10.1109/uemcon47517.2019.8993090.
Der volle Inhalt der QuelleGavėnaitė-Sirvydienė, Julija, und Algita Miečinskienė. „FORECASTING COSTS OF CYBER ATTACKS USING ESTIMATION THE GLOBAL COST OF CYBER RISK CALCULATOR V 1.2“. In International Scientific Conference „Contemporary Issues in Business, Management and Economics Engineering". Vilnius Gediminas Technical University, 2021. http://dx.doi.org/10.3846/cibmee.2021.618.
Der volle Inhalt der QuelleMassel, Liudmila, und Vladimir Kuzmin. „Tools for Strategic Decision Support in Energy Sector Based on Situation Management and Semantic Modeling“. In Vth International workshop "Critical infrastructures: Contingency management, Intelligent, Agent-based, Cloud computing and Cyber security" (IWCI 2018). Paris, France: Atlantis Press, 2018. http://dx.doi.org/10.2991/iwci-18.2018.23.
Der volle Inhalt der QuelleKhayrullina, Elena. „Methodical Approach and Tools for Creating and Modifying Ontology-based Information System“. In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.4.
Der volle Inhalt der QuellePavlov, Alexander, und Alexander Stolbov. „The Application of the Knowledge-Based Systems Development Platform for Creating Scenario Analysis Support Tools“. In Proceedings of the VIth International Workshop 'Critical Infrastructures: Contingency Management, Intelligent, Agent-Based, Cloud Computing and Cyber Security' (IWCI 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/iwci-19.2019.8.
Der volle Inhalt der QuelleKawano, K. „Cyber security threat management“. In IEE Seminar on Security of Distributed Control Systems. IEEE, 2005. http://dx.doi.org/10.1109/iee.2005.201377.
Der volle Inhalt der QuelleKawano, K. „Cyber security threat management“. In IEE Seminar on Security of Distributed Control Systems. IEE, 2005. http://dx.doi.org/10.1049/ic:20050259.
Der volle Inhalt der QuelleRajput, Prashant Hari Narayan, und Michail Maniatakos. „JTAG: A Multifaceted Tool for Cyber Security“. In 2019 IEEE 25th International Symposium on On-Line Testing And Robust System Design (IOLTS). IEEE, 2019. http://dx.doi.org/10.1109/iolts.2019.8854430.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Cyber security management tool"
Nielsen, Roy S. CS651 Computer Systems Security Foundations 3d Imagination Cyber Security Management Plan. Office of Scientific and Technical Information (OSTI), März 2015. http://dx.doi.org/10.2172/1171665.
Der volle Inhalt der QuelleEdgar, Thomas W. Conformance Tool High Level Design Document: IEC 61850 Cyber Security Acceleration Project. Office of Scientific and Technical Information (OSTI), Mai 2013. http://dx.doi.org/10.2172/1134528.
Der volle Inhalt der QuelleHaller, John, Samuel A. Merrell, Matthew J. Butkovic und Bradford J. Willke. Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability. Fort Belvoir, VA: Defense Technical Information Center, Juni 2010. http://dx.doi.org/10.21236/ada536721.
Der volle Inhalt der QuelleLong, Michael, Daniel Bush, Stephen Briggs, Tapan Patel, Eileen Westervelt, Daniel Shepard, Eric Lynch und David Schwenk. An Army guide to navigating the cyber security process for Facility Related Control Systems : cybersecurity and risk management framework explanations for the real world. Engineer Research and Development Center (U.S.), Januar 2020. http://dx.doi.org/10.21079/11681/35294.
Der volle Inhalt der QuelleRico, Helen M., Fred Hall, II Maciolek und Michael J. From Garage-Band to World Tour: Technical, Security, and Scalability Challenges of a Web-Based Program Management Tool from Workgroup-Level to Enterprise-Class in 24 Months. Fort Belvoir, VA: Defense Technical Information Center, Juni 2004. http://dx.doi.org/10.21236/ada465793.
Der volle Inhalt der QuelleHoward, Heidi, Chad Helmle, Raina Dwivedi und Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), Januar 2021. http://dx.doi.org/10.21079/11681/39480.
Der volle Inhalt der Quelle