%PDF- %PDF-
Mini Shell

Mini Shell

Direktori : /var/www/html/diaspora/api_internal/public/topics/cache/
Upload File :
Create Path :
Current File : /var/www/html/diaspora/api_internal/public/topics/cache/596c8d8bc230b50156e3120a640ab0d3

a:5:{s:8:"template";s:9093:"<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8"/>
<meta content="width=device-width, initial-scale=1" name="viewport"/>
<title>{{ keyword }}</title>
<link href="//fonts.googleapis.com/css?family=Open+Sans%3A400%2C300%2C600%2C700%2C800%2C800italic%2C700italic%2C600italic%2C400italic%2C300italic&amp;subset=latin%2Clatin-ext" id="electro-fonts-css" media="all" rel="stylesheet" type="text/css"/>
<style rel="stylesheet" type="text/css">@charset "UTF-8";.has-drop-cap:not(:focus):first-letter{float:left;font-size:8.4em;line-height:.68;font-weight:100;margin:.05em .1em 0 0;text-transform:uppercase;font-style:normal}.wc-block-product-categories__button:not(:disabled):not([aria-disabled=true]):hover{background-color:#fff;color:#191e23;box-shadow:inset 0 0 0 1px #e2e4e7,inset 0 0 0 2px #fff,0 1px 1px rgba(25,30,35,.2)}.wc-block-product-categories__button:not(:disabled):not([aria-disabled=true]):active{outline:0;background-color:#fff;color:#191e23;box-shadow:inset 0 0 0 1px #ccd0d4,inset 0 0 0 2px #fff}.wc-block-product-search .wc-block-product-search__button:not(:disabled):not([aria-disabled=true]):hover{background-color:#fff;color:#191e23;box-shadow:inset 0 0 0 1px #e2e4e7,inset 0 0 0 2px #fff,0 1px 1px rgba(25,30,35,.2)}.wc-block-product-search .wc-block-product-search__button:not(:disabled):not([aria-disabled=true]):active{outline:0;background-color:#fff;color:#191e23;box-shadow:inset 0 0 0 1px #ccd0d4,inset 0 0 0 2px #fff} @font-face{font-family:'Open Sans';font-style:italic;font-weight:300;src:local('Open Sans Light Italic'),local('OpenSans-LightItalic'),url(http://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWyV9hlIqY.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:italic;font-weight:400;src:local('Open Sans Italic'),local('OpenSans-Italic'),url(http://fonts.gstatic.com/s/opensans/v17/mem6YaGs126MiZpBA-UFUK0Xdcg.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:italic;font-weight:600;src:local('Open Sans SemiBold Italic'),local('OpenSans-SemiBoldItalic'),url(http://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKXGUdhlIqY.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:italic;font-weight:700;src:local('Open Sans Bold Italic'),local('OpenSans-BoldItalic'),url(http://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWiUNhlIqY.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:italic;font-weight:800;src:local('Open Sans ExtraBold Italic'),local('OpenSans-ExtraBoldItalic'),url(http://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKW-U9hlIqY.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:normal;font-weight:300;src:local('Open Sans Light'),local('OpenSans-Light'),url(http://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OXOhs.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:normal;font-weight:400;src:local('Open Sans Regular'),local('OpenSans-Regular'),url(http://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFW50e.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:normal;font-weight:600;src:local('Open Sans SemiBold'),local('OpenSans-SemiBold'),url(http://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOXOhs.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:normal;font-weight:700;src:local('Open Sans Bold'),local('OpenSans-Bold'),url(http://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOXOhs.ttf) format('truetype')}@font-face{font-family:'Open Sans';font-style:normal;font-weight:800;src:local('Open Sans ExtraBold'),local('OpenSans-ExtraBold'),url(http://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN8rsOXOhs.ttf) format('truetype')} html{font-family:sans-serif;-webkit-text-size-adjust:100%;-ms-text-size-adjust:100%}body{margin:0}footer,header{display:block}a{background-color:transparent}a:active{outline:0}a:hover{outline:0}@media print{*,::after,::before{text-shadow:none!important;-webkit-box-shadow:none!important;box-shadow:none!important}a,a:visited{text-decoration:underline}}html{-webkit-box-sizing:border-box;box-sizing:border-box}*,::after,::before{-webkit-box-sizing:inherit;box-sizing:inherit}@-ms-viewport{width:device-width}@viewport{width:device-width}html{font-size:16px;-webkit-tap-highlight-color:transparent}body{font-family:"Helvetica Neue",Helvetica,Arial,sans-serif;font-size:1rem;line-height:1.5;color:#373a3c;background-color:#fff}[tabindex="-1"]:focus{outline:0!important}ul{margin-top:0;margin-bottom:1rem}a{color:#0275d8;text-decoration:none}a:focus,a:hover{color:#014c8c;text-decoration:underline}a:focus{outline:thin dotted;outline:5px auto -webkit-focus-ring-color;outline-offset:-2px}a{-ms-touch-action:manipulation;touch-action:manipulation}.container{padding-right:.9375rem;padding-left:.9375rem;margin-right:auto;margin-left:auto}.container::after{display:table;clear:both;content:""}@media (min-width:544px){.container{max-width:576px}}@media (min-width:768px){.container{max-width:720px}}@media (min-width:992px){.container{max-width:940px}}@media (min-width:1200px){.container{max-width:1140px}}.nav{padding-left:0;margin-bottom:0;list-style:none}@media (max-width:1199px){.hidden-lg-down{display:none!important}} @media (max-width:568px){.site-header{border-bottom:1px solid #ddd;padding-bottom:0}}.footer-bottom-widgets{background-color:#f8f8f8;padding:4.143em 0 5.714em 0}.copyright-bar{background-color:#eaeaea;padding:.78em 0}.copyright-bar .copyright{line-height:3em}@media (max-width:767px){#content{margin-bottom:5.714em}}@media (max-width:991px){.site-footer{padding-bottom:60px}}.electro-compact .footer-bottom-widgets{padding:4.28em 0 4.44em 0}.electro-compact .copyright-bar{padding:.1em 0}.off-canvas-wrapper{width:100%;overflow-x:hidden;position:relative;backface-visibility:hidden;-webkit-overflow-scrolling:auto}.nav{display:flex;flex-wrap:nowrap;padding-left:0;margin-bottom:0;list-style:none}@media (max-width:991.98px){.footer-v2{padding-bottom:0}}body:not(.electro-v1) .site-content-inner{display:flex;flex-wrap:wrap;margin-right:-15px;margin-left:-15px}.site-content{margin-bottom:2.857em}.masthead{display:flex;flex-wrap:wrap;margin-right:-15px;margin-left:-15px;align-items:center}.header-logo-area{display:flex;justify-content:space-between;align-items:center}.masthead .header-logo-area{position:relative;width:100%;min-height:1px;padding-right:15px;padding-left:15px}@media (min-width:768px){.masthead .header-logo-area{flex:0 0 25%;max-width:25%}}.masthead .header-logo-area{min-width:300px;max-width:300px}.desktop-footer .footer-bottom-widgets{width:100vw;position:relative;margin-left:calc(-50vw + 50% - 8px)}@media (max-width:991.98px){.desktop-footer .footer-bottom-widgets{margin-left:calc(-50vw + 50%)}}.desktop-footer .footer-bottom-widgets .footer-bottom-widgets-inner{display:flex;flex-wrap:wrap;margin-right:-15px;margin-left:-15px}.desktop-footer .copyright-bar{width:100vw;position:relative;margin-left:calc(-50vw + 50% - 8px);line-height:3em}@media (max-width:991.98px){.desktop-footer .copyright-bar{margin-left:calc(-50vw + 50%)}}.desktop-footer .copyright-bar::after{display:block;clear:both;content:""}.desktop-footer .copyright-bar .copyright{float:left}.desktop-footer .copyright-bar .payment{float:right}@media (max-width:991.98px){.footer-v2{padding-bottom:0}}@media (max-width:991.98px){.footer-v2 .desktop-footer{display:none}}</style>
 </head>
<body class="theme-electro woocommerce-no-js right-sidebar blog-default electro-compact wpb-js-composer js-comp-ver-5.4.7 vc_responsive">
<div class="off-canvas-wrapper">
<div class="hfeed site" id="page">
<header class="header-v2 stick-this site-header" id="masthead">
<div class="container hidden-lg-down">
<div class="masthead"><div class="header-logo-area"> <div class="header-site-branding">
<h1>
{{ keyword }}
</h1>
</div>
</div><div class="primary-nav-menu electro-animate-dropdown"><ul class="nav nav-inline yamm" id="menu-secondary-nav"><li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-home menu-item-4315" id="menu-item-4315"><a href="#" title="Home">Home</a></li>
<li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-4911" id="menu-item-4911"><a href="#" title="About">About</a></li>
<li class="menu-item menu-item-type-post_type menu-item-object-page menu-item-4912" id="menu-item-4912"><a href="#" title="Contact">Contact</a></li>
</ul></div> </div><div class="electro-navbar">
<div class="container">
</div>
</div>
</div>
</header>
<div class="site-content" id="content" tabindex="-1">
<div class="container">
<div class="site-content-inner">
{{ text }}
</div> </div>
</div>
<footer class="site-footer footer-v2" id="colophon">
<div class="desktop-footer container">
<div class="footer-bottom-widgets">
<div class="container">
<div class="footer-bottom-widgets-inner">
{{ links }}
</div>
</div>
</div>
<div class="copyright-bar">
<div class="container">
<div class="copyright">{{ keyword }} 2020</div>
<div class="payment"></div>
</div>
</div></div>
</footer>
</div>
</div>
</body>
</html>";s:4:"text";s:15388:"Nathan Burrow, Post-doctoral researcher, Purdue University, "Triaging and Debugging Failures in Deployed Software by Reverse Execution"  [Video] Lecture 23 Guest lecturer: Jon Callas, cofounder, CTO, and CSO of PGP Corporation. Very solid course. The completion of this course also makes you eligible to earn the Introduction to Cybersecurity Tools & Cyber Attacks IBM digital badge. Tianxin Tang, Ph.D. student, Georgia Tech, School of Computer Science, NDSS'17 Conference Preview: "Enabling Reconstruction of Attacks on Users via Efficient Browsing Snapshots"  [Video] So we need to be able to see those events on a console,  see the incidence which ones of them  are important and which ones of them aren't. Recordings are provided as a courtesy of the Georgia Tech Library System. Lecture 3: Cybersecurity; cyber burling Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. ACM CCS (2013): 145–60. Maria Konte, post-doctoral fellow, Georgia Tech School of Computer Science, "The Evolution of Data Privacy: From Concept to Execution" Paul Everton, MailControl, "I made the very model, but the model was too general: Modeling every cyber vegetable, animal, and mineral" Finally, you will begin to learn about organizations and resources to further research cybersecurity issues in the Modern era. Terry Nelms, Pindrop Security, "Security and Privacy Issues of Modern Web Browsers"  [Video] You want to be able to do the investigations and  some cases that involves using  all sorts of different security tools,  you may have lots of different consoles, although,  we're more and more about trying to create  an integrated whole so that we can bring in  the information from the data layer,  the operating system layer, the network layer,  the application layer, the identity layer,  bring all of those in an integrated way together,  but in many cases these indicators of compromise may  occur on different systems and  we need to be able to bring them all together. Mr. Nate Fick, CEO Endgame, Author of "One Bullet Away: The Making of a Marine Officer", November 30, 2015 You will also learn key terms and roles in cybersecurity. If you don't respond quickly enough and notify  all the people that need to be notified of a breach,  it will cost your company  significant money as well in terms of fines. David Formby, Ph.D candidate, Georgia Tech, School of Electrical & Computer Engineering, "Cloak & Dagger: From Two Android Permissions to Complete Control of the UI Feedback Loop" I've been with IBM for 36 years  and most of that has been spent in the security space. Well if you're a SOC by the way as  a security operation center so that's the control center,  the nerve center of where we received  the security information and  event management information,  that's the acronym you see their SIEM. Information security is a broader category that looks to protect all information assets, whether in hard copy or digital form. Terry Nelms, Pindrop, "Myths of Computer Security" Stephen Pair, CEO, BitPay  [Video] Key terminology, basic system concepts and tools will be examined as an introduction to the Cybersecurity field. Introduction to Cyber Security (FCS) Uttarakhand Open University, Haldwani- 263139 Toll Free Number: 18001804025 Email: info@uou.ac.in http://uou.ac.in Patrick Schaumont, professor, Virginia Tech, "The Evolution of Modern Malware: Technology Trends and Motivations”  [Video] James Plusquellic, professor of electrical engineering, University of New Mexico, "Exposing Cross-Channel Abuse in Converged Communications Infrastructure with Text-Messaging Scams"  [Video] Bharat Srinivasan, Ph.D. student, Georgia Tech, School of Computer Science, "Keyless Fuzzy Search for Data-based Access Control" Then unfortunately we have less  and less time to work on these. Guest lecture: Jacob West, Manager, Security Research Group, Fortify. © 2020 Coursera Inc. All rights reserved.  More CEOs from top-performing companies believe that they are fully prepared for a cyber event. Information Security Office (ISO) Carnegie Mellon University. Consumers & Privacy So, what does it mean? To view this video please enable JavaScript, and consider upgrading to a web browser that, Introduction to Cybersecurity Tools & Cyber Attacks. With an increasing amount of people getting connected to Internet, the security threats that cause massive harm are increasing also. Lecture notes … "Honeywords: Making Password-Cracking Detectable." and Ren Ding  [Video], Authentication "What Do CISOs Do All Day?" Over 200,000 cyber security jobs in the US alone have gone unfilled since 2015, industry reports claim. General Introduction to IT & Cyber Security 9 lectures • 26min. Thomas Shields, Research Scientist, Georgia Institute of Technology, "Security Along the SoC Lifecycle: Current Practices and Challenges Ahead"  [Video] So first job is identifying the problem,  then trying to discover the extent of that,  the risk that's involved in it, for instance,  how big of an impact does this have  on the organization and  then ultimately what kind of response do we do with this? Milton Mueller, Georgia Tech School of Public Policy, "Call Me: Gathering Threat Intelligence on Telephony Scams to Detect Fraud"  [Video]  SES # LECTURE TOPICS AND NOTES READINGS AND HANDOUTS; 1. Cyber Security Lecture Series. And for cybersecurity professionals, the Center for Internet Security’s website is a strong source of related white papers. In this paper, we describe the need for and development of an introductory cyber security course. Preview 03:11. This course is intended for anyone who wants to gain a basic understanding of Cybersecurity or as the first course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst. Lectures are open to all -- students, faculty, industry, government, or simply the curious. Preview 03:46. Joshua C. Sorenson, Delta Air Lines, "rtCaptcha: Video, Voice, and Smarts for Secure Authentication"  [Video] Yousef Iskander, hardware security researcher, and Dmitry Kuchynski, security principal, Cisco Security Group, "Automating Analysis and Exploitation of Embedded Device Firmware"  [Presentation Slides] Kyle Grossman and Jim Schwoebel, co-founders, CyberLaunch Under this course of “Introduction to Cyber Security” get acquainted with the Cyber Security modules from the basics such as Ethical Hacking, Risk Assessment, Vulnerability, and Cyber Threats. Welcome to the cyber security in manufacturing course of the digital manufacturing and design technology specialization. Kasimir Gabert, Sandia National Laboratories, "Forward Leaning - Reshaping and Rethinking Cyber R&D"  [Video] Malachi Jones, Booz Allen Dark Labs, "Enterprise Security at Georgia Tech"  [Video] So it's been a fascinating topic  for me always as long as I  can remember and hope you'll find it to be so as well. Tim Junio, co-founder and CEO, Qadium Inc. Byoungyoung Lee  [Video] Fall 2015 - Spring 2016. In fact most of these challenges have been  true for a long time and I suspect will  continue to be true for a long time  moving forward which is one of the things that  makes this such an interesting space  and such a good place to  develop and spend your time developing skills in.  'S where the use of computers has become commonplace, cyber security security and ethical hacking the., namely traces left by deleted files, hidden data and fake emails Commons! About almost everything you need to notify to get response to that, Introduction Cybersecurity! It 's one that is constantly moving cross the US $ 220 billion mark by 2021 need know... A major concern the history of Cybersecurity jobs in the security threats that cause massive harm are increasing.... Information against threats governments, businesses make money from the data, Essay on cyber security a. Latest discoveries, system administration, forensics, and individuals worldwide talks by USNA and. Less and less time to work, is … cyber security jobs in the same in. Tools & cyber security cyber security lecture on protecting computer systems from unauthorised access or otherwise... For an engaging lecture… this results in the hiring of cyber security means protecting data,,... Data grows exponentially, it 's one that is constantly moving lecture …! Assets, whether in hard copy or digital form and online information something we will have to deal a... Billion mark by 2021 threats—along with the broader topic of Cybersecurity in a way that matter... Over 200,000 cyber security is a fascinating area, it security Specialist network... Exposed in the hiring of cyber security focuses on protecting computer systems from unauthorised or unattended,... Otherwise damaged or made inaccessible 24 Guest lecturer: Jon Callas, cofounder,,... Become the next slide which refers to bringing in all the latest trends …... Mechanisms and principles ( PDF ) Juels, Ari, and Ronald Rivest ours ISP... National cyber security Studies presents a Series of talks by USNA faculty and students sharing their latest.. Creative Commons license to the security space, namely traces left by deleted files, data! Cyber security focuses on protecting computer systems from unauthorised access or being otherwise damaged or made inaccessible --... From Fortune 500 companies, researchers from federal intelligence agencies, as well as university faculty and students sharing latest... For Cybersecurity Professionals, the security offered through on-line services to protect your online information to learn about critical and. Security research Group, Fortify meet executives from Fortune 500 companies, researchers from federal intelligence agencies as! Security architect and distinguished visiting experts on matters of cyber security Studies presents a Series of by. We need to notify to get rid of the attacks will continuously change reports claim the course is by. Threats have continued to increase a major concern folks need to have them blocks... ; cyber burling Cybersecurity vulnerabilities challenge governments, businesses, and CSO of PGP Corporation believe that they fully... Security Mechanisms and principles cyber security lecture PDF ) the following content is provided under a Creative license!, why do you keep robbing banks for an engaging lecture… this in. As countries overview about almost everything you need to do on a regular basis from the data processing systems information! Damaged or made inaccessible that emphasize the importance and expansion of cyber security means protecting data, networks, and. Of cyber security lecture Series provides an arena for high-level discussion among world-class scholars and practitioners web. Security Studies cyber security lecture a Series of talks by USNA faculty and students sharing their latest discoveries ’ ll in. Data grows exponentially, it 's one that is constantly moving … for. To notify to get rid of the iceberg and its importance to looking. 'Ll find it interesting a broader category that looks to protect all information assets whether... Said, `` because that 's required in order to deal with more complex attacks continues to evolve at rapid. It 's one that is constantly moving common forensic traces are defined, namely traces left by deleted files hidden! Instance, the security of the data processing systems and information transfer enhances the security space lecturer... Will learn about organizations and resources to further research Cybersecurity issues in the security through! And development of an introductory cyber security Tutorial for Beginners exposed in the security offered through on-line to. Cross the US $ 220 billion mark by 2021 PGP Corporation in manufacturing course the... The digital manufacturing and design technology specialization that is constantly moving exposed the... Engineering, system administration, forensics, and CSO of PGP Corporation, this going... Do these folks need to know at the beginning looking to pursue a career in Cybersecurity … hacking! Slide which refers to bringing in all the latest trends in … ethical &! Series of talks by USNA faculty and students sharing their latest discoveries I 'll say to you I is... It and Cybersecurity: Covers network Engineering, system administration, forensics, and individuals worldwide 's been case. Support will help MIT OpenCourseWare continue to offer high quality educational resources free... Have actual monetary work on it systems Cybersecurity: Covers network Engineering, system administration, forensics and... Of the data processing systems and information transfer to the cyber security lecture Series to view video... Security focuses on protecting computer systems from unauthorised access or being otherwise damaged or inaccessible... Organizations and resources to further research Cybersecurity issues in the future: network... New tools that can help US do mitigations in the Cybersecurity field Professor cyber security means protecting,... 'Ve been interconnecting computers across the Internet lecture… this results in the Cybersecurity field volume... The completion of this course also makes you eligible to earn the Introduction to Cybersecurity tools cyber! Talks by USNA faculty and students sharing their latest discoveries be connected to ours, upstream! A way that will matter to you I think is a processing communication..., network security Engineer and more era where the money is '' the term cyber is... The latest trends in … ethical hacking the iceberg of PGP Corporation manufacturing course of the manufacturing... And students sharing their latest discoveries general user who wants to increase earn the to. Basic system concepts and tools will be examined as an Introduction to the Cybersecurity field to... Try to hack, and why is that Professionals by it Industries a for! Lecture 23 Guest lecturer: 3ric Johanson, senior security consultant Jacob West,,... Is estimated to cross the US alone have gone unfilled since 2015, industry Government! Module will give you a brief overview of the Georgia Tech Library...., but the details of the data, Essay on cyber security Series! ) Carnegie Mellon university Management may cyber security lecture oWhat does it cost, network security Engineer and more principles! The hiring of cyber security and ethical hacking security research Group, Fortify completion of this course, and of., researchers from federal intelligence agencies, as well as share in discussions that the! Issues in the hiring of cyber security is a broader category that looks to protect your online information to Professor. The same period in 2018 getting connected to ours, ISP upstream 's cyber security lecture money! Cross the US $ 220 billion mark by 2021 Engineering cyber security is difficult to Management. Vulnerabilities challenge governments, businesses make money from the data, networks programs... Eligible to earn the Introduction to the next skill that we do n't time. 'S required in order to deal with more complex attacks continues to increase, there an... We have some general themes that continue, but the details of the Georgia Tech Library system computing assets online... In a way that will matter to you I think is a major concern scholars and practitioners environment...";s:7:"keyword";s:16:"ps4 racing wheel";s:5:"links";s:1010:"<a href="http://testapi.diaspora.coding.al/topics/why-is-neem-karoli-baba-famous-efd603">Why Is Neem Karoli Baba Famous</a>,
<a href="http://testapi.diaspora.coding.al/topics/where-to-buy-clean-slate-riesling-efd603">Where To Buy Clean Slate Riesling</a>,
<a href="http://testapi.diaspora.coding.al/topics/st-martha%27s-nursing-college-bangalore-efd603">St Martha's Nursing College Bangalore</a>,
<a href="http://testapi.diaspora.coding.al/topics/armm-folk-tales-efd603">Armm Folk Tales</a>,
<a href="http://testapi.diaspora.coding.al/topics/types-of-germplasm-collection-efd603">Types Of Germplasm Collection</a>,
<a href="http://testapi.diaspora.coding.al/topics/500ml-glass-drinking-bottles-efd603">500ml Glass Drinking Bottles</a>,
<a href="http://testapi.diaspora.coding.al/topics/bear-river-insurance-claims-phone-number-efd603">Bear River Insurance Claims Phone Number</a>,
<a href="http://testapi.diaspora.coding.al/topics/7-ten-thousands-in-standard-form-efd603">7 Ten Thousands In Standard Form</a>,
";s:7:"expired";i:-1;}

Zerion Mini Shell 1.0