In Memory of Shon Harris |
|
xxi | |
Foreword |
|
xxiii | |
Acknowledgments |
|
xxv | |
From the Author |
|
xxvii | |
Why Become a CISSP? |
|
xxix | |
Chapter 1 Security and Risk Management |
|
1 | (188) |
|
Fundamental Principles of Security |
|
|
3 | (3) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (2) |
|
|
8 | (5) |
|
|
13 | (32) |
|
|
16 | (3) |
|
Enterprise Architecture Development |
|
|
19 | (14) |
|
Security Controls Development |
|
|
33 | (4) |
|
Process Management Development |
|
|
37 | (8) |
|
Functionality vs. Security |
|
|
45 | (1) |
|
The Crux of Computer Crime Laws |
|
|
45 | (3) |
|
Complexities in Cybercrime |
|
|
48 | (14) |
|
|
49 | (1) |
|
|
50 | (4) |
|
|
54 | (4) |
|
|
58 | (4) |
|
Intellectual Property Laws |
|
|
62 | (8) |
|
|
63 | (1) |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
65 | (2) |
|
Internal Protection of Intellectual Property |
|
|
67 | (1) |
|
|
68 | (2) |
|
|
70 | (14) |
|
The Increasing Need for Privacy Laws |
|
|
72 | (1) |
|
Laws, Directives, and Regulations |
|
|
73 | (8) |
|
|
81 | (3) |
|
|
84 | (2) |
|
U.S. Laws Pertaining to Data Breaches |
|
|
84 | (1) |
|
Other Nations' Laws Pertaining to Data Breaches |
|
|
85 | (1) |
|
Policies, Standards, Baselines, Guidelines, and Procedures |
|
|
86 | (8) |
|
|
87 | (3) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (4) |
|
|
95 | (1) |
|
Information Systems Risk Management Policy |
|
|
95 | (1) |
|
|
96 | (1) |
|
The Risk Management Process |
|
|
97 | (1) |
|
|
98 | (4) |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
101 | (1) |
|
Risk Assessment and Analysis |
|
|
102 | (24) |
|
|
103 | (1) |
|
The Value of Information and Assets |
|
|
104 | (1) |
|
Costs That Make Up the Value |
|
|
105 | (1) |
|
Identifying Vulnerabilities and Threats |
|
|
106 | (1) |
|
Methodologies for Risk Assessment |
|
|
107 | (5) |
|
|
112 | (4) |
|
Qualitative Risk Analysis |
|
|
116 | (3) |
|
|
119 | (4) |
|
|
123 | (1) |
|
Total Risk vs. Residual Risk |
|
|
123 | (1) |
|
|
124 | (2) |
|
|
126 | (1) |
|
Risk Management Frameworks |
|
|
126 | (4) |
|
Categorize Information System |
|
|
128 | (1) |
|
|
128 | (1) |
|
Implement Security Controls |
|
|
129 | (1) |
|
|
129 | (1) |
|
Authorize Information System |
|
|
130 | (1) |
|
Monitor Security Controls |
|
|
130 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
130 | (24) |
|
Standards and Best Practices |
|
|
133 | (3) |
|
Making BCM Part of the Enterprise Security Program |
|
|
136 | (3) |
|
|
139 | (15) |
|
|
154 | (3) |
|
|
155 | (2) |
|
|
157 | (1) |
|
Security-Awareness Training |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (9) |
|
|
160 | (5) |
|
|
165 | (1) |
|
The Computer Ethics Institute |
|
|
166 | (1) |
|
The Internet Architecture Board |
|
|
166 | (2) |
|
Corporate Ethics Programs |
|
|
168 | (1) |
|
|
168 | (2) |
|
|
170 | (19) |
|
|
175 | (9) |
|
|
184 | (5) |
Chapter 2 Asset Security |
|
189 | (58) |
|
|
190 | (3) |
|
|
190 | (1) |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
Information Classification |
|
|
193 | (6) |
|
|
194 | (3) |
|
|
197 | (2) |
|
|
199 | (7) |
|
|
199 | (4) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
206 | (4) |
|
Developing a Retention Policy |
|
|
207 | (3) |
|
|
210 | (5) |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (3) |
|
|
214 | (1) |
|
|
215 | (10) |
|
|
216 | (3) |
|
|
219 | (6) |
|
|
225 | (9) |
|
|
226 | (8) |
|
|
234 | (2) |
|
Protecting Mobile Devices |
|
|
234 | (1) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (10) |
|
|
239 | (4) |
|
|
243 | (4) |
Chapter 3 Security Engineering |
|
247 | (230) |
|
|
248 | (4) |
|
|
252 | (19) |
|
The Central Processing Unit |
|
|
252 | (5) |
|
|
257 | (1) |
|
|
258 | (13) |
|
|
271 | (30) |
|
|
271 | (9) |
|
|
280 | (5) |
|
Input/Output Device Management |
|
|
285 | (2) |
|
CPU Architecture Integration |
|
|
287 | (4) |
|
Operating System Architectures |
|
|
291 | (7) |
|
|
298 | (3) |
|
System Security Architecture |
|
|
301 | (6) |
|
|
301 | (1) |
|
Security Architecture Requirements |
|
|
302 | (5) |
|
|
307 | (6) |
|
|
307 | (1) |
|
|
308 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
311 | (1) |
|
|
311 | (1) |
|
Harrison-Ruzzo-Ullman Model |
|
|
312 | (1) |
|
|
313 | (5) |
|
|
313 | (4) |
|
Why Put a Product Through Evaluation? |
|
|
317 | (1) |
|
Certification vs. Accreditation |
|
|
318 | (2) |
|
|
318 | (1) |
|
|
319 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
|
320 | (1) |
|
Distributed System Security |
|
|
321 | (11) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (2) |
|
|
326 | (1) |
|
|
327 | (1) |
|
|
328 | (4) |
|
|
332 | (3) |
|
|
333 | (1) |
|
Time-of-Check/Time-of-Use Attacks |
|
|
333 | (2) |
|
|
335 | (5) |
|
The History of Cryptography |
|
|
335 | (5) |
|
Cryptography Definitions and Concepts |
|
|
340 | (10) |
|
|
342 | (1) |
|
The Strength of the Cryptosystem |
|
|
343 | (1) |
|
Services of Cryptosystems |
|
|
344 | (1) |
|
|
345 | (2) |
|
Running and Concealment Ciphers |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
350 | (3) |
|
|
351 | (1) |
|
|
351 | (2) |
|
|
353 | (16) |
|
Symmetric vs. Asymmetric Algorithms |
|
|
353 | (1) |
|
|
354 | (5) |
|
|
359 | (5) |
|
Hybrid Encryption Methods |
|
|
364 | (5) |
|
Types of Symmetric Systems |
|
|
369 | (11) |
|
|
370 | (7) |
|
|
377 | (1) |
|
Advanced Encryption Standard |
|
|
378 | (1) |
|
International Data Encryption Algorithm |
|
|
378 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
|
379 | (1) |
|
Types of Asymmetric Systems |
|
|
380 | (8) |
|
|
380 | (3) |
|
|
383 | (3) |
|
|
386 | (1) |
|
Elliptic Curve Cryptosystems |
|
|
386 | (1) |
|
|
387 | (1) |
|
|
387 | (1) |
|
|
388 | (11) |
|
|
388 | (5) |
|
Various Hashing Algorithms |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
394 | (1) |
|
|
395 | (1) |
|
Attacks Against One-Way Hash Functions |
|
|
395 | (1) |
|
|
396 | (2) |
|
Digital Signature Standard |
|
|
398 | (1) |
|
Public Key Infrastructure |
|
|
399 | (5) |
|
|
399 | (3) |
|
|
402 | (1) |
|
The Registration Authority |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (3) |
|
Key Management Principles |
|
|
406 | (1) |
|
Rules for Keys and Key Management |
|
|
407 | (1) |
|
|
407 | (2) |
|
|
408 | (1) |
|
|
409 | (5) |
|
|
410 | (1) |
|
|
410 | (1) |
|
|
410 | (1) |
|
Chosen-Ciphertext Attacks |
|
|
410 | (1) |
|
Differential Cryptanalysis |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
|
413 | (1) |
|
Social Engineering Attacks |
|
|
413 | (1) |
|
Meet-in-the-Middle Attacks |
|
|
414 | (1) |
|
Site and Facility Security |
|
|
414 | (1) |
|
The Site Planning Process |
|
|
415 | (24) |
|
Crime Prevention Through Environmental Design |
|
|
420 | (6) |
|
Designing a Physical Security Program |
|
|
426 | (13) |
|
|
439 | (1) |
|
Protecting Mobile Devices |
|
|
439 | (1) |
|
|
440 | (1) |
|
|
440 | (15) |
|
|
441 | (5) |
|
|
446 | (2) |
|
Fire Prevention, Detection, and Suppression |
|
|
448 | (7) |
|
|
455 | (1) |
|
|
455 | (22) |
|
|
461 | (10) |
|
|
471 | (6) |
Chapter 4 Communication and Network Security |
|
477 | (244) |
|
|
479 | (1) |
|
Open Systems Interconnection Reference Model |
|
|
479 | (18) |
|
|
480 | (3) |
|
|
483 | (1) |
|
|
484 | (1) |
|
|
485 | (2) |
|
|
487 | (2) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
Functions and Protocols in the OSI Model |
|
|
492 | (2) |
|
Tying the Layers Together |
|
|
494 | (1) |
|
|
495 | (2) |
|
|
497 | (15) |
|
|
498 | (5) |
|
|
503 | (3) |
|
|
506 | (3) |
|
Layer 2 Security Standards |
|
|
509 | (2) |
|
|
511 | (1) |
|
|
512 | (5) |
|
|
512 | (2) |
|
Asynchronous and Synchronous |
|
|
514 | (2) |
|
|
516 | (1) |
|
|
517 | (5) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (1) |
|
|
520 | (2) |
|
|
522 | (45) |
|
|
523 | (3) |
|
Media Access Technologies |
|
|
526 | (10) |
|
|
536 | (2) |
|
Network Protocols and Services |
|
|
538 | (9) |
|
|
547 | (8) |
|
|
555 | (5) |
|
Network Address Translation |
|
|
560 | (2) |
|
|
562 | (5) |
|
|
567 | (45) |
|
|
567 | (1) |
|
|
567 | (3) |
|
|
570 | (1) |
|
|
571 | (5) |
|
|
576 | (1) |
|
|
577 | (4) |
|
|
581 | (24) |
|
|
605 | (2) |
|
|
607 | (1) |
|
Unified Threat Management |
|
|
607 | (1) |
|
Content Distribution Networks |
|
|
608 | (1) |
|
Software Defined Networking |
|
|
609 | (3) |
|
|
612 | (2) |
|
Metropolitan Area Networks |
|
|
614 | (3) |
|
|
615 | (2) |
|
|
617 | (27) |
|
Telecommunications Evolution |
|
|
617 | (3) |
|
|
620 | (4) |
|
|
624 | (20) |
|
|
644 | (16) |
|
|
644 | (1) |
|
|
645 | (2) |
|
|
647 | (1) |
|
|
648 | (1) |
|
|
649 | (8) |
|
|
657 | (2) |
|
|
659 | (1) |
|
Wireless Communications Techniques |
|
|
660 | (25) |
|
|
664 | (1) |
|
Evolution of WLAN Security |
|
|
665 | (7) |
|
|
672 | (5) |
|
Best Practices for Securing WLANs |
|
|
677 | (1) |
|
|
678 | (1) |
|
Mobile Wireless Communication |
|
|
678 | (7) |
|
|
685 | (11) |
|
Link Encryption vs. End-to-End Encryption |
|
|
685 | (2) |
|
E-mail Encryption Standards |
|
|
687 | (3) |
|
|
690 | (6) |
|
|
696 | (4) |
|
|
696 | (2) |
|
|
698 | (1) |
|
|
699 | (1) |
|
|
700 | (1) |
|
|
700 | (1) |
|
|
701 | (20) |
|
|
706 | (9) |
|
|
715 | (6) |
Chapter 5 Identity and Access Management |
|
721 | (138) |
|
|
723 | (1) |
|
|
723 | (1) |
|
|
723 | (1) |
|
|
724 | (1) |
|
Identification, Authentication, Authorization, and Accountability |
|
|
724 | (63) |
|
Identification and Authentication |
|
|
727 | (12) |
|
|
739 | (23) |
|
|
762 | (14) |
|
|
776 | (9) |
|
|
785 | (1) |
|
Integrating Identity Services |
|
|
786 | (1) |
|
|
787 | (9) |
|
Discretionary Access Control |
|
|
787 | (2) |
|
|
789 | (2) |
|
Role-Based Access Control |
|
|
791 | (3) |
|
Rule-Based Access Control |
|
|
794 | (2) |
|
Access Control Techniques and Technologies |
|
|
796 | (3) |
|
Constrained User Interfaces |
|
|
796 | (1) |
|
|
797 | (1) |
|
Content-Dependent Access Control |
|
|
798 | (1) |
|
Context-Dependent Access Control |
|
|
799 | (1) |
|
Access Control Administration |
|
|
799 | (8) |
|
Centralized Access Control Administration |
|
|
800 | (7) |
|
Decentralized Access Control Administration |
|
|
807 | (1) |
|
|
807 | (7) |
|
|
808 | (1) |
|
|
809 | (1) |
|
|
810 | (1) |
|
|
811 | (3) |
|
|
814 | (5) |
|
Review of Audit Information |
|
|
816 | (2) |
|
Protecting Audit Data and Log Information |
|
|
818 | (1) |
|
|
818 | (1) |
|
|
819 | (3) |
|
Unauthorized Disclosure of Information |
|
|
819 | (3) |
|
Access Control Monitoring |
|
|
822 | (12) |
|
Intrusion Detection Systems |
|
|
822 | (8) |
|
Intrusion Prevention Systems |
|
|
830 | (4) |
|
Threats to Access Control |
|
|
834 | (6) |
|
|
835 | (1) |
|
|
835 | (1) |
|
|
836 | (1) |
|
|
836 | (4) |
|
|
840 | (1) |
|
|
840 | (19) |
|
|
845 | (9) |
|
|
854 | (5) |
Chapter 6 Security Assessment and Testing |
|
859 | (64) |
|
|
860 | (5) |
|
|
862 | (1) |
|
|
863 | (2) |
|
Auditing Technical Controls |
|
|
865 | (21) |
|
|
866 | (3) |
|
|
869 | (5) |
|
|
874 | (1) |
|
Other Vulnerability Types |
|
|
875 | (1) |
|
|
876 | (2) |
|
|
878 | (3) |
|
|
881 | (1) |
|
|
882 | (2) |
|
|
884 | (2) |
|
|
886 | (1) |
|
Auditing Administrative Controls |
|
|
886 | (19) |
|
|
886 | (3) |
|
|
889 | (3) |
|
Disaster Recovery and Business Continuity |
|
|
892 | (7) |
|
Security Training and Security Awareness Training |
|
|
899 | (4) |
|
Key Performance and Risk Indicators |
|
|
903 | (2) |
|
|
905 | (3) |
|
|
906 | (1) |
|
|
907 | (1) |
|
|
908 | (3) |
|
Before the Management Review |
|
|
909 | (1) |
|
|
909 | (2) |
|
|
911 | (1) |
|
|
911 | (1) |
|
|
911 | (12) |
|
|
914 | (5) |
|
|
919 | (4) |
Chapter 7 Security Operations |
|
923 | (154) |
|
The Role of the Operations Department |
|
|
924 | (1) |
|
Administrative Management |
|
|
925 | (5) |
|
Security and Network Personnel |
|
|
928 | (1) |
|
|
929 | (1) |
|
|
930 | (1) |
|
|
930 | (1) |
|
Operational Responsibilities |
|
|
931 | (2) |
|
Unusual or Unexplained Occurrences |
|
|
931 | (1) |
|
Deviations from Standards |
|
|
932 | (1) |
|
Unscheduled Initial Program Loads (aka Rebooting) |
|
|
932 | (1) |
|
|
933 | (7) |
|
|
933 | (3) |
|
Input and Output Controls |
|
|
936 | (1) |
|
|
937 | (2) |
|
|
939 | (1) |
|
|
940 | (24) |
|
|
941 | (8) |
|
Personnel Access Controls |
|
|
949 | (1) |
|
External Boundary Protection Mechanisms |
|
|
950 | (10) |
|
Intrusion Detection Systems |
|
|
960 | (2) |
|
|
962 | (1) |
|
|
963 | (1) |
|
|
963 | (1) |
|
Secure Resource Provisioning |
|
|
964 | (6) |
|
|
964 | (2) |
|
|
966 | (3) |
|
Provisioning Cloud Assets |
|
|
969 | (1) |
|
Network and Resource Availability |
|
|
970 | (14) |
|
Mean Time Between Failures |
|
|
971 | (1) |
|
|
972 | (1) |
|
|
973 | (8) |
|
|
981 | (2) |
|
|
983 | (1) |
|
|
984 | (9) |
|
|
985 | (1) |
|
Intrusion Detection and Prevention Systems |
|
|
986 | (2) |
|
|
988 | (1) |
|
|
988 | (3) |
|
|
991 | (2) |
|
The Incident Management Process |
|
|
993 | (9) |
|
|
998 | (1) |
|
|
998 | (1) |
|
|
999 | (1) |
|
|
1000 | (1) |
|
|
1001 | (1) |
|
|
1001 | (1) |
|
|
1002 | (28) |
|
Business Process Recovery |
|
|
1006 | (1) |
|
|
1006 | (7) |
|
Supply and Technology Recovery |
|
|
1013 | (5) |
|
Choosing a Software Backup Facility |
|
|
1018 | (3) |
|
|
1021 | (1) |
|
|
1021 | (4) |
|
Electronic Backup Solutions |
|
|
1025 | (3) |
|
|
1028 | (2) |
|
|
1030 | (1) |
|
|
1031 | (7) |
|
Developing Goals for the Plans |
|
|
1034 | (2) |
|
|
1036 | (2) |
|
|
1038 | (15) |
|
Computer Forensics and Proper Collection of Evidence |
|
|
1039 | (2) |
|
Motive, Opportunity, and Means |
|
|
1041 | (1) |
|
Computer Criminal Behavior |
|
|
1042 | (1) |
|
|
1042 | (1) |
|
The Forensic Investigation Process |
|
|
1043 | (6) |
|
What Is Admissible in Court? |
|
|
1049 | (2) |
|
Surveillance, Search, and Seizure |
|
|
1051 | (1) |
|
|
1052 | (1) |
|
Liability and Its Ramifications |
|
|
1053 | (7) |
|
|
1056 | (2) |
|
|
1058 | (1) |
|
|
1058 | (1) |
|
Procurement and Vendor Processes |
|
|
1059 | (1) |
|
|
1060 | (3) |
|
|
1063 | (1) |
|
|
1064 | (1) |
|
|
1064 | (13) |
|
|
1067 | (5) |
|
|
1072 | (5) |
Chapter 8 Software Development Security |
|
1077 | (136) |
|
|
1077 | (1) |
|
Where Do We Place Security? |
|
|
1078 | (6) |
|
Different Environments Demand Different Security |
|
|
1080 | (1) |
|
Environment vs. Application |
|
|
1081 | (1) |
|
Functionality vs. Security |
|
|
1082 | (1) |
|
Implementation and Default Issues |
|
|
1082 | (2) |
|
Software Development Life Cycle |
|
|
1084 | (13) |
|
|
1084 | (1) |
|
Requirements Gathering Phase |
|
|
1085 | (1) |
|
|
1086 | (3) |
|
|
1089 | (4) |
|
|
1093 | (2) |
|
Release/Maintenance Phase |
|
|
1095 | (2) |
|
Secure Software Development Best Practices |
|
|
1097 | (1) |
|
Software Development Models |
|
|
1098 | (11) |
|
|
1099 | (1) |
|
|
1099 | (1) |
|
|
1100 | (1) |
|
|
1101 | (1) |
|
|
1101 | (1) |
|
|
1102 | (2) |
|
Rapid Application Development |
|
|
1104 | (1) |
|
|
1105 | (4) |
|
|
1109 | (2) |
|
|
1109 | (2) |
|
Capability Maturity Model Integration |
|
|
1111 | (2) |
|
|
1113 | (3) |
|
Software Configuration Management |
|
|
1114 | (2) |
|
Security of Code Repositories |
|
|
1116 | (1) |
|
Programming Languages and Concepts |
|
|
1116 | (16) |
|
Assemblers, Compilers, Interpreters |
|
|
1119 | (2) |
|
|
1121 | (8) |
|
Other Software Development Concepts |
|
|
1129 | (2) |
|
Application Programming Interfaces |
|
|
1131 | (1) |
|
|
1132 | (10) |
|
Distributed Computing Environment |
|
|
1132 | (2) |
|
|
1134 | (2) |
|
|
1136 | (2) |
|
Java Platform, Enterprise Edition |
|
|
1138 | (1) |
|
Service-Oriented Architecture |
|
|
1138 | (4) |
|
|
1142 | (4) |
|
|
1142 | (2) |
|
|
1144 | (2) |
|
|
1146 | (9) |
|
Specific Threats for Web Environments |
|
|
1146 | (8) |
|
Web Application Security Principles |
|
|
1154 | (1) |
|
|
1155 | (23) |
|
Database Management Software |
|
|
1155 | (2) |
|
|
1157 | (4) |
|
Database Programming Interfaces |
|
|
1161 | (3) |
|
Relational Database Components |
|
|
1164 | (2) |
|
|
1166 | (3) |
|
|
1169 | (5) |
|
Data Warehousing and Data Mining |
|
|
1174 | (4) |
|
Malicious Software (Malware) |
|
|
1178 | (15) |
|
|
1179 | (3) |
|
|
1182 | (1) |
|
|
1182 | (2) |
|
|
1184 | (1) |
|
|
1184 | (2) |
|
|
1186 | (1) |
|
|
1186 | (1) |
|
|
1187 | (3) |
|
|
1190 | (2) |
|
|
1192 | (1) |
|
Assessing the Security of Acquired Software |
|
|
1193 | (1) |
|
|
1194 | (1) |
|
|
1194 | (19) |
|
|
1199 | (8) |
|
|
1207 | (6) |
Appendix A Comprehensive Questions |
|
1213 | (56) |
|
|
1249 | (20) |
Appendix B About the CD-ROM |
|
1269 | (1) |
System Requirements |
|
1269 | (4) |
|
Total Tester Premium Practice Exam Software |
|
|
1269 | (1) |
|
Installing and Running Total Tester |
|
|
|
Premium Practice Exam Software |
|
|
1270 | (1) |
|
Hotspot and Drag-and-Drop Questions |
|
|
1270 | (1) |
|
|
1270 | (1) |
|
|
1271 | (1) |
|
Total Seminars Technical Support |
|
|
1271 | (1) |
|
McGraw-Hill Education Content Support |
|
|
1271 | (2) |
Glossary |
|
1273 | (18) |
Index |
|
1291 | |