Literatura académica sobre el tema "Great Firewall"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Great Firewall".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Artículos de revistas sobre el tema "Great Firewall"

1

Jagani, Aishwarya. "India’s Great Firewall". Index on Censorship 52, n.º 1 (abril de 2023): 68–71. http://dx.doi.org/10.1177/03064220231165392.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Mulvenon, James C. y Michael S. Chase. "Breaching the Great Firewall". Journal of E-Government 2, n.º 4 (31 de julio de 2006): 73–84. http://dx.doi.org/10.1300/j399v02n04_05.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Zhang, Lena L. "Behind the ‘Great Firewall’". Convergence: The International Journal of Research into New Media Technologies 12, n.º 3 (agosto de 2006): 271–91. http://dx.doi.org/10.1177/1354856506067201.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Liu, Jingqing. "Enhancing Network Security Through Router-Based Firewalls: An Investigation into Design, Effectiveness, and Human Factors". Highlights in Science, Engineering and Technology 85 (13 de marzo de 2024): 724–32. http://dx.doi.org/10.54097/axrsnb71.

Texto completo
Resumen
A firewall serves as a crucial computer program designed to block malicious software, thereby safeguarding the user's system. It helps prevent the unauthorized dissemination of personal information and the incursion of harmful viruses. Taking inspiration from China's "Great Firewall"—a sophisticated system utilizing advanced software and hardware to automatically filter, censor, and monitor internet content—this research aims to devise a router-based firewall system capable of autonomously shielding users' computers from viruses and unauthorized websites. A comprehensive questionnaire was deployed to unearth the predominant sources of information leakage among computer users and ascertain the role of firewalls within computer systems. The analytical findings underscore that the majority of information leakage security risks stem from a significant lack of personal privacy awareness and a deficient understanding of firewall security systems. The proposed firewall system harnesses router-based control to address the limitations inherent in PC software-based firmware systems. This innovation enhances the control of viral threats and the prevention of user privacy leaks. Serving as a tangible barrier, the router-based firewall obstructs the route of viruses or malevolent programs before reaching the user's computer. This strategic design substantially reduces user intervention, ensuring the continuous operation of the firewall to steadfastly protect the user's computing environment.
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Hughes, Christopher R. "Google and the Great Firewall". Survival 52, n.º 2 (25 de marzo de 2010): 19–26. http://dx.doi.org/10.1080/00396331003764538.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Scarfe-James, Rose. "Chinese voices behind ‘The Great Firewall’". Groundings Undergraduate 6 (1 de abril de 2013): 75–86. http://dx.doi.org/10.36399/groundingsug.6.229.

Texto completo
Resumen
The advent of the digital revolution has brought about a change in the nature of political engagement in China. The Internet and digital technologies have broadened the horizons of China’s net citizens and despite rigorous censorship and intervention on the part of the Chinese Communist Party (CCP); voices are being heard from behind the ‘Great Firewall’. With more than 500 million Internet users, Chinese citizens are a huge online presence, consequences of which include an explosion in blogging culture, cyber vigilantism and user-generated media content. It is clear that the Internet has empowered Chinese citizens in both the online and offline spheres. These developments have prompted scholars to contemplate whether there is a form of civil society developing in China in the wake of the digital revolution. However a culturally attuned conception of civil society must be developed in order to discuss an emerging Chinese civil society with any meaningful outcomes.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Manaseer, Saher, Ahmad K. Al Hwaitat y Riad Jabri. "Distributed Detection and prevention of Web Threats in Heterogeneous Environment". Modern Applied Science 12, n.º 10 (9 de septiembre de 2018): 13. http://dx.doi.org/10.5539/mas.v12n10p13.

Texto completo
Resumen
The growth of web Applications have increased rapidly due to the huge development of technology with very short turnaround time and with this development the protection from vulnerabilities became very difficult. There is a continuous demand for developing new methods that is able to prevent the fast growth of attacking methods and vulnerabilities. Furthermore there is a great demand to have coordination between different security infrastructure and protection applications to distribution of the attack log in order to prevent the attacker from further attacks to other web hosts. This research proposes a distributed web firewall defensive mechanism which provide a synchronized environment that is consists of several synchronized web application firewalls. Every web application is protected by a web application firewall that send feedback reports that include the type of the attack, The IP Address of the attacker and time of attack to other synchronized firewalls inside the environment to take action against the attacker.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Tsuchiya, Akihiro, Francisco Fraile, Ichiro Koshijima, Angel Ortiz y Raul Poler. "Software defined networking firewall for industry 4.0 manufacturing systems". Journal of Industrial Engineering and Management 11, n.º 2 (6 de abril de 2018): 318. http://dx.doi.org/10.3926/jiem.2534.

Texto completo
Resumen
Purpose: In order to leverage automation control data, Industry 4.0 manufacturing systems require industrial devices to be connected to the network. Potentially, this can increase the risk of cyberattacks, which can compromise connected industrial devices to acquire production data or gain control over the production process. Search engines such as Sentient Hyper-Optimized Data Access Network (SHODAN) can be perverted by attackers to acquire network information that can be later used for intrusion. To prevent this, cybersecurity standards propose network architectures divided into several networks segments based on system functionalities. In this architecture, Firewalls limit the exposure of industrial control devices in order to minimize security risks. This paper presents a novel Software Defined Networking (SDN) Firewall that automatically applies this standard architecture without compromising network flexibility. Design/methodology/approach: The proposed SDN Firewall changes filtering rules in order to implement the different network segments according to application level access control policies. The Firewall applies two filtering techniques described in this paper: temporal filtering and spatial filtering, so that only applications in a white list can connect to industrial control devices. Network administrators need only to configure this application-oriented white lists to comply with security standards for ICS. This simplifies to a great extent network management tasks. Authors have developed a prototype implementation based on the OPC UA Standard and conducted security tests in order to test the viability of the proposal.Findings: Network segmentation and segregation are effective counter-measures against network scanning attacks. The proposed SDN Firewall effectively configures a flat network into virtual LAN segments according to security standard guidelines.Research limitations/implications: The prototype implementation still needs to implement several features to exploit the full potential of the proposal. Next steps for development are discussed in a separate section.Practical implications: The proposed SDN Firewall has similar security features to commercially available application Firewalls, but SDN Firewalls offer additional security features. First, SDN technology provides improved performance, since SDN low-level processing functions are much more efficient. Second, with SDN, security functions are rooted in the network instead of being centralized in particular network elements. Finally, SDN provides a more flexible and dynamic, zero configuration framework for secure manufacturing systems by automating the rollout of security standard-based network architectures. Social implications: SDN Firewalls can facilitate the deployment of secure Industry 4.0 manufacturing systems, since they provide ICS networks with many of the needed security capabilities without compromising flexibility. Originality/value: The paper proposes a novel SDN Firewall specifically designed to secure ICS networks. A prototype implementation of the proposed SDN Firewall has been tested in laboratory conditions. The prototype implementation complements the security features of the OPC UA communication standard to provide a holistic security framework for ICS networks.
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ensafi, Roya, Philipp Winter, Abdullah Mueen y Jedidiah R. Crandall. "Analyzing the Great Firewall of China Over Space and Time". Proceedings on Privacy Enhancing Technologies 2015, n.º 1 (1 de abril de 2015): 61–76. http://dx.doi.org/10.1515/popets-2015-0005.

Texto completo
Resumen
AbstractA nation-scale firewall, colloquially referred to as the “Great Firewall of China,” implements many different types of censorship and content filtering to control China’s Internet traffic. Past work has shown that the firewall occasionally fails. In other words, sometimes clients in China are able to reach blacklisted servers outside of China. This phenomenon has not yet been characterized because it is infeasible to find a large and geographically diverse set of clients in China from which to test connectivity. In this paper, we overcome this challenge by using a hybrid idle scan technique that is able to measure connectivity between a remote client and an arbitrary server, neither of which are under the control of the researcher performing measurements. In addition to hybrid idle scans, we present and employ a novel side channel in the Linux kernel’s SYN backlog. We show that both techniques are practical by measuring the reachability of the Tor network which is known to be blocked in China. Our measurements reveal that failures in the firewall occur throughout the entire country without any conspicuous geographical patterns.We give some evidence that routing plays a role, but other factors (such as how the GFW maintains its list of IP/port pairs to block) may also be important.
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Anderson, Daniel. "Splinternet Behind the Great Firewall of China". Queue 10, n.º 11 (noviembre de 2012): 40–49. http://dx.doi.org/10.1145/2390756.2405036.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Tesis sobre el tema "Great Firewall"

1

Seiwald, Michael. "A detailed analysis of the follow-up scanning performed by the Great Firewall of China". Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26523.

Texto completo
Resumen
The Great Firewall of China (GFC) represents one of the most sophisticated censoring infrastructures in the world. While several aspects of the GFC including HTTP keyword filtering and DNS tampering have been studied thoroughly in the past, recent work has shown that the GFC goes to great lengths to prevent its citizens from using the Tor anonymity network. By employing the so-called follow-up scanning technique, Tor bridge relays are blocked dynamically. In this thesis, we survey previous work in the area of the GFC ranging from HTTP keyword filtering and DNS tampering, to the Tor follow-up scanning. Furthermore, additional experiments are carried out to gain a better understanding of how the follow-up scanning is implemented as well as where the filtering occurs for different protocols.
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Lovito, Monica. "Informazione in Cina fra ieri e oggi: media, netizen e l'apertura al mondo". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2015. http://amslaurea.unibo.it/8200/.

Texto completo
Resumen
Il lavoro è incentrato sull'analisi del percorso storico delle riforme in CIna nel campo dell'informazione. Si presente in caso dell'attivismo online come strumento di partecipazione alla diffusione delle informazioni. Per ultimo, si è presentato il lavoro delle testate giornalistiche cinesi aperte all'informazione globale.
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Hsiao, Yu-Hsuan y 蕭宇軒. "In and Out of the Great Firewall of China: Taiwanese Exchange Students’ Practices of Internet Usage". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/j8juu9.

Texto completo
Resumen
碩士
國立臺灣師範大學
大眾傳播研究所
105
Abstract This thesis explores Taiwanese exchange students’ Internet practices while exchanging in China. Facing the Internet regulation and the peculiar Internet context, Taiwanese exchange students need to change their existing Internet practices in Taiwan. Hence, by conducting field research with in-depth interviews and online date, I try to document Taiwanese exchange students’ strategies, including bypassing the great firewall of China, and its meanings for Taiwanese exchange students. The findings are divided into three sections. First, network capital and economic capital influence how Taiwanese exchange students find the useful and stable way to bypass the great firewall of China. Taiwanese exchange students would use the tactics and wait the impeccable moment to successfully bypass the great firewall of China. Second, Taiwanese exchange students bypass the great firewall of China to find information in accordance with their habitus, cultural capital or communicate with their established interpersonal network in Taiwan. At the meantime, combining online and offline space, bypassing the wall makes students regain their private space as if they were in Taiwan. Third, the experiences and reasons that Taiwanese exchange students use Chinese Internet channels. In conclusion, the great firewall of China should be considered an opportunity for experiments. The value of ‘Now-ness’ is sometimes ignored while the quotidian practice of internet usage. But it becomes visible when Taiwanese exchange students can hardly practice their existing habits in China. The ways Taiwanese exchange students try to break through the internet restrictions reveal the value of internet is to break the spatiotemporal restrictions and satisfy the desires for communication and information.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Libros sobre el tema "Great Firewall"

1

Li, Yonggang. Wo men de fang huo shan: Wang luo shi dai de biao da yu jian guan = Our great firewall : Expression and governance in the era of the internet. 8a ed. Guilin Shi: Guangxi shi fan da xue chu ban she, 2009.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Nelson, K. B. Children of the Great Reckoning: Firewall, Book 1. Karunajoythi Books, 2013.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2020.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Roberts, Margaret E. Censored: Distraction and Diversion Inside China's Great Firewall. Princeton University Press, 2018.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Griffiths, James. Great Firewall of China: How to Build and Control an Alternative Version of the Internet. Zed Books, Limited, 2021.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Griffiths, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Griffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Griffith, James. Great Firewall of China: How to Build and Control an Alternate Vision of the Internet. Zed Books, Limited, 2019.

Buscar texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Capítulos de libros sobre el tema "Great Firewall"

1

Clayton, Richard, Steven J. Murdoch y Robert N. M. Watson. "Ignoring the Great Firewall of China". En Privacy Enhancing Technologies, 20–35. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11957454_2.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Taylor, Monique. "Building Digital Authoritarianism: From the Great Firewall to the New IP". En China’s Digital Authoritarianism, 1–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-11252-2_1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Gaufman, Elizaveta. "Cybercrime and Punishment: Security, Information War, and the Future of Runet". En The Palgrave Handbook of Digital Russia Studies, 115–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42855-6_7.

Texto completo
Resumen
AbstractCybersecurity à la Russe is marked by the authoritarian nature of the state that is primarily concerned by the question of regime survival. This logic motivates continuous securitization of the Internet that is framed as a potential accessory to crimes committed both by foreign and domestic actors. This chapter aims to show the discrepancies in Russian cyber politics at home and abroad, highlighting its struggle for more internet regulation that is seen by the Russian government as a panacea against perceived external attempts at regime change while exploiting digital public spaces abroad. At the same time, this chapter shows that despite seemingly formidable “cyber army” capabilities for external use, domestic surveillance and attempts to build a Great Russian Firewall are still lacking.
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Mao, Weizhun. "Tiny Netizens Mocking the Great Firewall: Discourse, Power, and the Politics of Representation in China, 2005 to 2010". En Social Inequality & the Politics of Representation: A Global Landscape, 275–97. 1 Oliver's Yard, 55 City Road London EC1Y 1SP: SAGE Publications, Inc, 2013. http://dx.doi.org/10.4135/9781071934227.n18.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Keats, Jonathon. "Great Firewall". En Virtual Words. Oxford University Press, 2010. http://dx.doi.org/10.1093/oso/9780195398540.003.0018.

Texto completo
Resumen
The Chinese government declared 1996 the Year of the Internet. There wasn’t much to it: only one person in ten thousand was connected—at a modem speed of 14.4 kilobits per second—and 86 percent of the population had never encountered a computer. Even in universities email was still a novelty, haltingly introduced in 1994. Yet in one respect China was the most advanced nation on the planet. Using equipment supplied by Sun Microsystems and Cisco, the Chinese Public Security Bureau had corralled the entire country, all 3,705,000 square miles, within a fanghuo qiang, or firewall. The firewall promised to make the internet safe for autocracy. All online communication could be monitored, at least in principle, and access to any website could be denied. On February 1, 1996, Premier Li Peng signed State Council Order 195, officially placing the government “in charge of overall planning, national standardization, graded control, and the development of all areas related to the internet,” and expressly forbidding users “to endanger national security or betray state secrets.” Enforcement was arbitrary. Discipline was imposed by the dread of uncertainty. This was an inevitability, since the Public Security Bureau couldn’t possibly watch all online activity within China, let alone block every objectionable web page worldwide. Interviewed by Wired magazine, the computer engineer overseeing the fanghuo qiang bluntly explained his working policy: “You make a problem for us, and we’ll make a law for you.” In many countries such a firewall might have stifled development, but most Chinese weren’t interested in making problems. They were attracted to the internet’s dazzling potential, as advertised on billboards that encouraged them to “join the internet club, meet today’s successful people, experience the spirit of the age, drink deep of the cup of leisure.” Those who could afford a connection, which cost approximately half the monthly salary of a recent college graduate, casually referred to the fanghuo qiang as the wangguan , calmly evoking the many guan (passes) of the Great Wall as natural features of China’s wan wei wang (ten-thousand-dimensional web).
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

"17. The Great Firewall". En Words of Fire, 186–94. New York University Press, 2020. http://dx.doi.org/10.18574/nyu/9780814763919.003.0020.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Gainous, Jason, Rongbin Han, Andrew W. MacDonald y Kevin M. Wagner. "Jumping Over the Great Firewall". En Directed Digital Dissidence in Autocracies, 72–83. Oxford University PressNew York, 2023. http://dx.doi.org/10.1093/oso/9780197680384.003.0005.

Texto completo
Resumen
Abstract In this chapter, we describe how the Chinese government is addressing and effectively neutralizing citizens who evade the firewall. We begin by building the framework for understanding how this development may be a threat to the Chinese government’s strategy. Indeed, our data indicate that many citizens are actually jumping the wall to gather sensitive political information. Given the obvious difficulty in measuring such sensitive activity, we employed several checks on the validity of our measure, all of which generally align with respondents’ self-reported behavior. We demonstrate that many citizens do distrust the central government and that the more internet users jump the wall, the less trusting and satisfied they are with the central government. We present evidence that there may be consequences resulting from the difficult proposition of trying to control the information flow on the other side of the firewall. The results in this chapter show that this difficulty could counteract or even overwhelm, from the point of view of the regime, the positive effect of the directed digital dissidence strategy.
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

"Jumping the wall". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-009.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

"Uyghurs online". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-011.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

"NoGuGe". En The Great Firewall of China. Zed Books Ltd, 2019. http://dx.doi.org/10.5040/9781350225497.ch-014.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.

Actas de conferencias sobre el tema "Great Firewall"

1

Pang, Sheng, Changjia Chen y Jinkang Jia. "Session Hijack in the Great Firewall of China". En 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, 2009. http://dx.doi.org/10.1109/nswctc.2009.277.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Ensafi, Roya, David Fifield, Philipp Winter, Nick Feamster, Nicholas Weaver y Vern Paxson. "Examining How the Great Firewall Discovers Hidden Circumvention Servers". En IMC '15: Internet Measurement Conference. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2815675.2815690.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Comb, Matthew y Paul A. Watters. "Peeking behind the great firewall: Privacy on Chinese file sharing networks". En 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2016. http://dx.doi.org/10.1109/pst.2016.7907024.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Weinberg, Zachary, Diogo Barradas y Nicolas Christin. "Chinese Wall or Swiss Cheese? Keyword filtering in the Great Firewall of China". En WWW '21: The Web Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3442381.3450076.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Chandel, Sonali, Zang Jingji, Yu Yunnan, Sun Jingyao y Zhang Zhipeng. "The Golden Shield Project of China: A Decade Later—An in-Depth Study of the Great Firewall". En 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2019. http://dx.doi.org/10.1109/cyberc.2019.00027.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Hillmer, Dirk. "VirTeam Tool". En ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/cie-4298.

Texto completo
Resumen
Abstract The rapid evolution of information and the new potentials for communication between people, have been of great importance to the success of most organizations. Key aspects were the increased availability of computer networks and the rowing trend towards team work. People are becoming connected through the Internet. People can use the network behind their computer as a great resource for solving problems. The purpose of this research is to simplify starts of collaboration tools. Individuals will be able to establish connections on demand. The schedule of group appointments and conference schedule should be supported, therefore, all necessary information has to be provided. Also behind firewalls a secure way to allow access to these data has to be found.
Los estilos APA, Harvard, Vancouver, ISO, etc.

Informes sobre el tema "Great Firewall"

1

Whiting, Michael D. The Great Firewall of China: A Critical Analysis. Fort Belvoir, VA: Defense Technical Information Center, junio de 2008. http://dx.doi.org/10.21236/ada488175.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía