Search Results for - Narrowed by: Springer E-Book Collection - Management of Computing and Information Systems. - Computers.SirsiDynix Enterprisehttps://catalog.tedu.edu.tr/client/tr_TR/defaulttr/defaulttr/qf$003dLOCATION$002509Lokasyon$0025091$00253ASPRINGER$002509Springer$002bE-Book$002bCollection$0026qf$003dSUBJECT$002509Konu$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$002509Management$002bof$002bComputing$002band$002bInformation$002bSystems.$0026qf$003dSUBJECT$002509Konu$002509Computers.$002509Computers.$0026ps$003d300$0026isd$003dtrue?2024-06-19T11:28:42ZOpen Source Systems 15th IFIP WG 2.13 International Conference, OSS 2019, Montreal, QC, Canada, May 26–27, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4278332024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Bordeleau, Francis. editor.<br/><a href="https://doi.org/10.1007/978-3-030-20883-7">https://doi.org/10.1007/978-3-030-20883-7</a><br/>Format: Electronic Resources<br/>Advances in Information Systems Development Designing Digitalizationent://SD_ILS/0/SD_ILS:4277922024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Andersson, Bo. editor.<br/><a href="https://doi.org/10.1007/978-3-030-22993-1">https://doi.org/10.1007/978-3-030-22993-1</a><br/>Format: Electronic Resources<br/>Digital Services and Platforms. Considerations for Sourcing 12th Global Sourcing Workshop 2018, La Thuile, Italy, February 21–24, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4286782024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Kotlarsky, Julia. editor. (orcid)0000-0002-1478-549X<br/><a href="https://doi.org/10.1007/978-3-030-15850-7">https://doi.org/10.1007/978-3-030-15850-7</a><br/>Format: Electronic Resources<br/>Big Scientific Data Benchmarks, Architecture, and Systems First Workshop, SDBA 2018, Beijing, China, June 12, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288282024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Ren, Rui. editor.<br/><a href="https://doi.org/10.1007/978-981-13-5910-1">https://doi.org/10.1007/978-981-13-5910-1</a><br/>Format: Electronic Resources<br/>Systems, Software and Services Process Improvement 26th European Conference, EuroSPI 2019, Edinburgh, UK, September 18–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4291452024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Walker, Alastair. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28005-5">https://doi.org/10.1007/978-3-030-28005-5</a><br/>Format: Electronic Resources<br/>Theory and Practice of Natural Computing 8th International Conference, TPNC 2019, Kingston, ON, Canada, December 9–11, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4285362024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Martín-Vide, Carlos. editor. (orcid)0000-0003-1670-6000<br/><a href="https://doi.org/10.1007/978-3-030-34500-6">https://doi.org/10.1007/978-3-030-34500-6</a><br/>Format: Electronic Resources<br/>Big Scientific Data Management First International Conference, BigSDM 2018, Beijing, China, November 30 – December 1, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4277122024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Li, Jianhui. editor.<br/><a href="https://doi.org/10.1007/978-3-030-28061-1">https://doi.org/10.1007/978-3-030-28061-1</a><br/>Format: Electronic Resources<br/>Managed Software Evolutionent://SD_ILS/0/SD_ILS:4282942024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Reussner, Ralf. editor.<br/><a href="https://doi.org/10.1007/978-3-030-13499-0">https://doi.org/10.1007/978-3-030-13499-0</a><br/>Format: Electronic Resources<br/>Software Engineering and Methodology for Emerging Domains 16th National Conference, NASAC 2017, Harbin, China, November 4–5, 2017, and 17th National Conference, NASAC 2018, Shenzhen, China, November 23–25, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4288432024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Li, Zheng. editor. (orcid)0000-0002-3938-7033<br/><a href="https://doi.org/10.1007/978-981-15-0310-8">https://doi.org/10.1007/978-981-15-0310-8</a><br/>Format: Electronic Resources<br/>Membrane Computing 19th International Conference, CMC 2018, Dresden, Germany, September 4–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4290982024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Hinze, Thomas. editor.<br/><a href="https://doi.org/10.1007/978-3-030-12797-8">https://doi.org/10.1007/978-3-030-12797-8</a><br/>Format: Electronic Resources<br/>Managing Humans Biting and Humorous Tales of a Software Engineering Managerent://SD_ILS/0/SD_ILS:164462024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Lopp, Michael. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-2158-7">http://dx.doi.org/10.1007/978-1-4842-2158-7</a><br/>Format: Electronic Resources<br/>Open Source Systems: Integrating Communities 12th IFIP WG 2.13 International Conference, OSS 2016, Gothenburg, Sweden, May 30 - June 2, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179732024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Crowston, Kevin. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39225-7">http://dx.doi.org/10.1007/978-3-319-39225-7</a><br/>Format: Electronic Resources<br/>Transactions on Computational Collective Intelligence XXVent://SD_ILS/0/SD_ILS:186952024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Nguyen, Ngoc Thanh. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-53580-6">http://dx.doi.org/10.1007/978-3-662-53580-6</a><br/>Format: Electronic Resources<br/>PMP® Examination Practice Questions 400 Practice Questions and Answers to help you Passent://SD_ILS/0/SD_ILS:164412024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Whitaker, Sean. author.<br/><a href="http://dx.doi.org/10.1007/978-1-4842-1883-9">http://dx.doi.org/10.1007/978-1-4842-1883-9</a><br/>Format: Electronic Resources<br/>Product Lifecycle Management in the Era of Internet of Things 12th IFIP WG 5.1 International Conference, PLM 2015, Doha, Qatar, October 19-21, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:178182024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Bouras, Abdelaziz. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-33111-9">http://dx.doi.org/10.1007/978-3-319-33111-9</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedingsent://SD_ILS/0/SD_ILS:179872024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39381-0">http://dx.doi.org/10.1007/978-3-319-39381-0</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedingsent://SD_ILS/0/SD_ILS:180062024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Manulis, Mark. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-39555-5">http://dx.doi.org/10.1007/978-3-319-39555-5</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2016 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:176442024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-31517-1">http://dx.doi.org/10.1007/978-3-319-31517-1</a><br/>Format: Electronic Resources<br/>Social Media: The Good, the Bad, and the Ugly 15th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2016, Swansea, UK, September 13–15, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183152024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Dwivedi, Yogesh K. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45234-0">http://dx.doi.org/10.1007/978-3-319-45234-0</a><br/>Format: Electronic Resources<br/>Mobility Management Principle, Technology and Applicationsent://SD_ILS/0/SD_ILS:186712024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Chen, Shanzhi. author.<br/><a href="http://dx.doi.org/10.1007/978-3-662-52726-9">http://dx.doi.org/10.1007/978-3-662-52726-9</a><br/>Format: Electronic Resources<br/>Tamed Agility Pragmatic Contracting and Collaboration in Agile Software Projectsent://SD_ILS/0/SD_ILS:181532024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Book, Matthias. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-41478-2">http://dx.doi.org/10.1007/978-3-319-41478-2</a><br/>Format: Electronic Resources<br/>Computer and Information Scienceent://SD_ILS/0/SD_ILS:180632024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Lee, Roger. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-40171-3">http://dx.doi.org/10.1007/978-3-319-40171-3</a><br/>Format: Electronic Resources<br/>Network and System Security 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183792024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Chen, Jiageng. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-46298-1">http://dx.doi.org/10.1007/978-3-319-46298-1</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 9th International Conference, TRUST 2016, Vienna, Austria, August 29-30, 2016, Proceedingsent://SD_ILS/0/SD_ILS:183372024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Franz, Michael. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-45572-3">http://dx.doi.org/10.1007/978-3-319-45572-3</a><br/>Format: Electronic Resources<br/>Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedingsent://SD_ILS/0/SD_ILS:232842024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Jahankhani, Hamid. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-23276-8">http://dx.doi.org/10.1007/978-3-319-23276-8</a><br/>Format: Electronic Resources<br/>Open Source Systems: Adoption and Impact 11th IFIP WG 2.13 International Conference, OSS 2015, Florence, Italy, May 16-17, 2015, Proceedingsent://SD_ILS/0/SD_ILS:227462024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Damiani, Ernesto. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-17837-0">http://dx.doi.org/10.1007/978-3-319-17837-0</a><br/>Format: Electronic Resources<br/>Information Systems and Neuroscience Gmunden Retreat on NeuroIS 2015ent://SD_ILS/0/SD_ILS:228482024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Davis, Fred D. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18702-0">http://dx.doi.org/10.1007/978-3-319-18702-0</a><br/>Format: Electronic Resources<br/>FM 2015: Formal Methods 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:229142024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Bjørner, Nikolaj. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-19249-9">http://dx.doi.org/10.1007/978-3-319-19249-9</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection IX 9th IFIP 11.10 International Conference, ICCIP 2015, Arlington, VA, USA, March 16-18, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:235382024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Rice, Mason. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-26567-4">http://dx.doi.org/10.1007/978-3-319-26567-4</a><br/>Format: Electronic Resources<br/>Transforming Learning and IT Management through Gamificationent://SD_ILS/0/SD_ILS:228472024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Prakash, Edmond C. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-18699-3">http://dx.doi.org/10.1007/978-3-319-18699-3</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papersent://SD_ILS/0/SD_ILS:234572024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar James, Joshua I. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-25512-5">http://dx.doi.org/10.1007/978-3-319-25512-5</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 8th International Conference, TRUST 2015, Heraklion, Greece, August 24-26, 2015, Proceedingsent://SD_ILS/0/SD_ILS:232382024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Conti, Mauro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-22846-4">http://dx.doi.org/10.1007/978-3-319-22846-4</a><br/>Format: Electronic Resources<br/>Applied Cryptography and Network Security 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papersent://SD_ILS/0/SD_ILS:236142024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Malkin, Tal. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-28166-7">http://dx.doi.org/10.1007/978-3-319-28166-7</a><br/>Format: Electronic Resources<br/>Implementing IT Processes The Main 17 IT Processes and Directions for a Successful Implementationent://SD_ILS/0/SD_ILS:242082024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Pilorget, Lionel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-658-04773-3">http://dx.doi.org/10.1007/978-3-658-04773-3</a><br/>Format: Electronic Resources<br/>Pattern and Security Requirements Engineering-Based Establishment of Security Standardsent://SD_ILS/0/SD_ILS:225852024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Beckers, Kristian. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-16664-3">http://dx.doi.org/10.1007/978-3-319-16664-3</a><br/>Format: Electronic Resources<br/>Advances in Cryptology -- ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security,Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part Ient://SD_ILS/0/SD_ILS:248862024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48797-6">http://dx.doi.org/10.1007/978-3-662-48797-6</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2015 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part IIent://SD_ILS/0/SD_ILS:248872024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Iwata, Tetsu. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-48800-3">http://dx.doi.org/10.1007/978-3-662-48800-3</a><br/>Format: Electronic Resources<br/>Economics of Grids, Clouds, Systems, and Services 11th International Conference, GECON 2014, Cardiff, UK, September 16-18, 2014. Revised Selected Papers.ent://SD_ILS/0/SD_ILS:222602024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Altmann, Jörn. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14609-6">http://dx.doi.org/10.1007/978-3-319-14609-6</a><br/>Format: Electronic Resources<br/>Knowledge-Based Software Engineering 11th Joint Conference, JCKBSE 2014, Volgograd, Russia, September 17-20, 2014. Proceedingsent://SD_ILS/0/SD_ILS:218042024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Kravets, Alla. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-11854-3">http://dx.doi.org/10.1007/978-3-319-11854-3</a><br/>Format: Electronic Resources<br/>FM 2014: Formal Methods 19th International Symposium, Singapore, May 12-16, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208202024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Jones, Cliff. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06410-9">http://dx.doi.org/10.1007/978-3-319-06410-9</a><br/>Format: Electronic Resources<br/>Trust and Trustworthy Computing 7th International Conference, TRUST 2014, Heraklion, Crete, June 30 – July 2, 2014. Proceedingsent://SD_ILS/0/SD_ILS:211992024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Holz, Thorsten. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-08593-7">http://dx.doi.org/10.1007/978-3-319-08593-7</a><br/>Format: Electronic Resources<br/>Progress in Cryptology – AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedingsent://SD_ILS/0/SD_ILS:208752024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Pointcheval, David. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-06734-6">http://dx.doi.org/10.1007/978-3-319-06734-6</a><br/>Format: Electronic Resources<br/>SOA Maturity Model A Delphi-Derived Proposal for Inter-Enterprise Setupsent://SD_ILS/0/SD_ILS:202132024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Antoniades, Pericles. author.<br/><a href="http://dx.doi.org/10.1007/978-3-319-02453-0">http://dx.doi.org/10.1007/978-3-319-02453-0</a><br/>Format: Electronic Resources<br/>Human Aspects of Information Security, Privacy, and Trust Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedingsent://SD_ILS/0/SD_ILS:210432024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Tryfonas, Theo. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-07620-1">http://dx.doi.org/10.1007/978-3-319-07620-1</a><br/>Format: Electronic Resources<br/>Foundations of Security Analysis and Design VII FOSAD 2012/2013 Tutorial Lecturesent://SD_ILS/0/SD_ILS:214462024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Aldini, Alessandro. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-10082-1">http://dx.doi.org/10.1007/978-3-319-10082-1</a><br/>Format: Electronic Resources<br/>Digital Forensics and Cyber Crime Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papersent://SD_ILS/0/SD_ILS:222192024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Gladyshev, Pavel. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-319-14289-0">http://dx.doi.org/10.1007/978-3-319-14289-0</a><br/>Format: Electronic Resources<br/>Open Source Software: Mobile Open Source Technologies 10th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2014, San José, Costa Rica, May 6-9, 2014. Proceedingsent://SD_ILS/0/SD_ILS:240942024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Corral, Luis. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-642-55128-4">http://dx.doi.org/10.1007/978-3-642-55128-4</a><br/>Format: Electronic Resources<br/>Critical Infrastructure Protection VIII 8th IFIP WG 11.10 International Conference, ICCIP 2014, Arlington, VA, USA, March 17-19, 2014, Revised Selected Papersent://SD_ILS/0/SD_ILS:246212024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Butts, Jonathan. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45355-1">http://dx.doi.org/10.1007/978-3-662-45355-1</a><br/>Format: Electronic Resources<br/>Foundations of Digital Government Leading and Managing in the Digital Eraent://SD_ILS/0/SD_ILS:237322024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Veit, Daniel. author.<br/><a href="http://dx.doi.org/10.1007/978-3-642-38511-7">http://dx.doi.org/10.1007/978-3-642-38511-7</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part IIent://SD_ILS/0/SD_ILS:246532024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45608-8">http://dx.doi.org/10.1007/978-3-662-45608-8</a><br/>Format: Electronic Resources<br/>Advances in Cryptology – ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part Ient://SD_ILS/0/SD_ILS:246542024-06-19T11:28:42Z2024-06-19T11:28:42ZYazar Sarkar, Palash. editor.<br/><a href="http://dx.doi.org/10.1007/978-3-662-45611-8">http://dx.doi.org/10.1007/978-3-662-45611-8</a><br/>Format: Electronic Resources<br/>