Enviar pesquisa
Carregar
Robots are among us, but who takes responsibility?
•
1 gostou
•
858 visualizações
Cyber Security Alliance
Seguir
Dr Sylvain Métille, Cyber Security Conference 2016
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 21
Baixar agora
Baixar para ler offline
Recomendados
第1回恵太研勉強会でのスライドです
脱「丸コピー」のための電子回路入門
脱「丸コピー」のための電子回路入門
Ryota Suzuki
Presentation by Jon Hsieh at USENIX LISA14
Taming Operations in the Hadoop Ecosystem
Taming Operations in the Hadoop Ecosystem
Cloudera, Inc.
Latincomm Expo - Oct 2012
Latincomm Expo - Oct 2012
Carlo Longino
Presented as part of the workshop on Teaching with Tablets and Apps at the 2013 National Meeting of the American Society for Horticultural Sciences in Palm Desert, CA, Thursday, July 25, 2013
Live lecture capture with whiteboard annotation and i tunesu
Live lecture capture with whiteboard annotation and i tunesu
Steven Newman
CYA - Cover Your Assets. Disaster Recovery 101
CYA - Cover Your Assets. Disaster Recovery 101
Auskosh
Time management: why saving time should be a priority. Learn how to win time as a company. Interested in reading helpful blogs for your company? Visit our website www.teamleader.eu
Time management
Time management
Teamleader
2013PCカンファレンス・シンポジウム1: 大学教育における対面授業・物理的学習環境の価値を再考する コンピュータ利用教育学会(CIEC)および全国大学生活協同組合連合会が主催の大会シンポジウム資料
アクティブラーニングの観点から 2013年8月3日 2013 PCカンファレンス
アクティブラーニングの観点から 2013年8月3日 2013 PCカンファレンス
Kazumasa HAYASHI
Materi Asistensi Ekuitas Credit to Kieso
Equities
Equities
Nico Iswaraputra
Recomendados
第1回恵太研勉強会でのスライドです
脱「丸コピー」のための電子回路入門
脱「丸コピー」のための電子回路入門
Ryota Suzuki
Presentation by Jon Hsieh at USENIX LISA14
Taming Operations in the Hadoop Ecosystem
Taming Operations in the Hadoop Ecosystem
Cloudera, Inc.
Latincomm Expo - Oct 2012
Latincomm Expo - Oct 2012
Carlo Longino
Presented as part of the workshop on Teaching with Tablets and Apps at the 2013 National Meeting of the American Society for Horticultural Sciences in Palm Desert, CA, Thursday, July 25, 2013
Live lecture capture with whiteboard annotation and i tunesu
Live lecture capture with whiteboard annotation and i tunesu
Steven Newman
CYA - Cover Your Assets. Disaster Recovery 101
CYA - Cover Your Assets. Disaster Recovery 101
Auskosh
Time management: why saving time should be a priority. Learn how to win time as a company. Interested in reading helpful blogs for your company? Visit our website www.teamleader.eu
Time management
Time management
Teamleader
2013PCカンファレンス・シンポジウム1: 大学教育における対面授業・物理的学習環境の価値を再考する コンピュータ利用教育学会(CIEC)および全国大学生活協同組合連合会が主催の大会シンポジウム資料
アクティブラーニングの観点から 2013年8月3日 2013 PCカンファレンス
アクティブラーニングの観点から 2013年8月3日 2013 PCカンファレンス
Kazumasa HAYASHI
Materi Asistensi Ekuitas Credit to Kieso
Equities
Equities
Nico Iswaraputra
Cradle 2 Cradle Promotions
Cradle 2 Cradle Promotions
clm0395
Oa3602 01-introduction
Oa3602 01-introduction
timothychung
ben huyley
1450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.5
investnethealthcare
Autor: Chema Caballero
Taller Primavera AMPap 2015 - Experiencia en África
Taller Primavera AMPap 2015 - Experiencia en África
AMPap Asociación Madrileña de Pediatría de Atención Primaria
Vispa
Vispa
ideaTRE60
Prezentace projektu Miss Academia do soutěže studentských manažerů v rámci Konference Projektového managementu ve Zlíně.
Konference PM - prezentace Miss Academia
Konference PM - prezentace Miss Academia
Martin Zdražil
Us elections and political processes
Us elections and political processes
Robert Deng
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
Social Innovation Exchange
Operational
Operational
Joan Pescador
Senalizacion de-senderos
Senalizacion de-senderos
Mª José Presa Tomé
Onboarding Program Guidance
Onboarding Program Guidance
Oday Talal
TEPfaktor je unikátní místo pro stmelení pracovního týmu! Jedinečný program pro stmelení týmu Připravíme vám unikátní firemní akci Spousty zajímavých úkolů Týmová spolupráce Konferenční prostory Nevšední ubytování v „Jungle Hotelu“ Profesionální catering Zajištění dopravy z Prahy a zpět Doprovodné programy pro firemní akci po skončení hry Profesionální zdokumentování akce s možností fotoknihy Individuální a profesionální přístup Opravdový a jedinečný teambuilding Celoroční provoz Pouze 40 km od Prahy
TEPfaktor - teambuilding na klíč 2016
TEPfaktor - teambuilding na klíč 2016
TEPfaktor
くだらないことをやりたい
くだらないことをやりたい
Julian Hartmann
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
jindrichweiss
QCon 2012 Bj 的重要讲演,抄发...
01s0401 go,互联网时代的c语言 许式伟
01s0401 go,互联网时代的c语言 许式伟
Zoom Quiet
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
visualbowler
Presentation about how to get buy in Security on doing DevOp A.k.a. DevOp in stead of BevOps
Help, my security officer doesn’t trust me v0.4
Help, my security officer doesn’t trust me v0.4
Frank Breedijk
Final Plan Primero Yacuiba
Final Plan Primero Yacuiba
Gobernacion Yacuiba
أنواع الدلالات 2
أنواع الدلالات 2
Fakhri Cool
Prezentace z předmětu Reklama na Fakultě multimediálních komunikací UTB. Účelem prezentace bylo představit hlavní výhody služby MailChimp.com v projektu Miss Academia ČR 2012.
MailChimp v praxi - Miss Academia
MailChimp v praxi - Miss Academia
Martin Zdražil
One of the core tenets of what people consider to be “DevOps” is to shorten the feedback loop in your development cycles. This tenet ties in directly with Agile methodologies utilized by software engineering teams. With the advent of easily accessible cloud infrastructure, and with the various operational tooling around those new infrastructure providers reaching a new level of maturity, we are now seeing a world where “DevOps” is mainstream. For companies starting new product development initiatives, using some form of Configuration Management is now table stakes to iterate quickly. Continuous Integration. Continuous Deployment. But who (or what) is continually monitoring the state of your operational security? This is where SecDevOps, or SecOps, comes into play. The SecDevOps methodology allows you to improve your security monitoring and response time, while maintaining your ability to continually deploy changes.
The Case For Continuous Security
The Case For Continuous Security
Threat Stack
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Innovation Network Technologies: InNet
Mais conteúdo relacionado
Mais procurados
Cradle 2 Cradle Promotions
Cradle 2 Cradle Promotions
clm0395
Oa3602 01-introduction
Oa3602 01-introduction
timothychung
ben huyley
1450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.5
investnethealthcare
Autor: Chema Caballero
Taller Primavera AMPap 2015 - Experiencia en África
Taller Primavera AMPap 2015 - Experiencia en África
AMPap Asociación Madrileña de Pediatría de Atención Primaria
Vispa
Vispa
ideaTRE60
Prezentace projektu Miss Academia do soutěže studentských manažerů v rámci Konference Projektového managementu ve Zlíně.
Konference PM - prezentace Miss Academia
Konference PM - prezentace Miss Academia
Martin Zdražil
Us elections and political processes
Us elections and political processes
Robert Deng
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
Social Innovation Exchange
Operational
Operational
Joan Pescador
Senalizacion de-senderos
Senalizacion de-senderos
Mª José Presa Tomé
Onboarding Program Guidance
Onboarding Program Guidance
Oday Talal
TEPfaktor je unikátní místo pro stmelení pracovního týmu! Jedinečný program pro stmelení týmu Připravíme vám unikátní firemní akci Spousty zajímavých úkolů Týmová spolupráce Konferenční prostory Nevšední ubytování v „Jungle Hotelu“ Profesionální catering Zajištění dopravy z Prahy a zpět Doprovodné programy pro firemní akci po skončení hry Profesionální zdokumentování akce s možností fotoknihy Individuální a profesionální přístup Opravdový a jedinečný teambuilding Celoroční provoz Pouze 40 km od Prahy
TEPfaktor - teambuilding na klíč 2016
TEPfaktor - teambuilding na klíč 2016
TEPfaktor
くだらないことをやりたい
くだらないことをやりたい
Julian Hartmann
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
jindrichweiss
QCon 2012 Bj 的重要讲演,抄发...
01s0401 go,互联网时代的c语言 许式伟
01s0401 go,互联网时代的c语言 许式伟
Zoom Quiet
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
visualbowler
Presentation about how to get buy in Security on doing DevOp A.k.a. DevOp in stead of BevOps
Help, my security officer doesn’t trust me v0.4
Help, my security officer doesn’t trust me v0.4
Frank Breedijk
Final Plan Primero Yacuiba
Final Plan Primero Yacuiba
Gobernacion Yacuiba
أنواع الدلالات 2
أنواع الدلالات 2
Fakhri Cool
Prezentace z předmětu Reklama na Fakultě multimediálních komunikací UTB. Účelem prezentace bylo představit hlavní výhody služby MailChimp.com v projektu Miss Academia ČR 2012.
MailChimp v praxi - Miss Academia
MailChimp v praxi - Miss Academia
Martin Zdražil
Mais procurados
(20)
Cradle 2 Cradle Promotions
Cradle 2 Cradle Promotions
Oa3602 01-introduction
Oa3602 01-introduction
1450 ben hurley ndrc the challenges we face 150528 v0.5
1450 ben hurley ndrc the challenges we face 150528 v0.5
Taller Primavera AMPap 2015 - Experiencia en África
Taller Primavera AMPap 2015 - Experiencia en África
Vispa
Vispa
Konference PM - prezentace Miss Academia
Konference PM - prezentace Miss Academia
Us elections and political processes
Us elections and political processes
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
What Can't We Teach through Learning by Doing? Aditya Dev Sood (CKS)
Operational
Operational
Senalizacion de-senderos
Senalizacion de-senderos
Onboarding Program Guidance
Onboarding Program Guidance
TEPfaktor - teambuilding na klíč 2016
TEPfaktor - teambuilding na klíč 2016
くだらないことをやりたい
くだらないことをやりたい
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
Katalog - 120 vteřIn pro inovativní firmy - 9.12.2010
01s0401 go,互联网时代的c语言 许式伟
01s0401 go,互联网时代的c语言 许式伟
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Global Revolution: Role of Communication in 21st Century Uprisings and Protests
Help, my security officer doesn’t trust me v0.4
Help, my security officer doesn’t trust me v0.4
Final Plan Primero Yacuiba
Final Plan Primero Yacuiba
أنواع الدلالات 2
أنواع الدلالات 2
MailChimp v praxi - Miss Academia
MailChimp v praxi - Miss Academia
Destaque
One of the core tenets of what people consider to be “DevOps” is to shorten the feedback loop in your development cycles. This tenet ties in directly with Agile methodologies utilized by software engineering teams. With the advent of easily accessible cloud infrastructure, and with the various operational tooling around those new infrastructure providers reaching a new level of maturity, we are now seeing a world where “DevOps” is mainstream. For companies starting new product development initiatives, using some form of Configuration Management is now table stakes to iterate quickly. Continuous Integration. Continuous Deployment. But who (or what) is continually monitoring the state of your operational security? This is where SecDevOps, or SecOps, comes into play. The SecDevOps methodology allows you to improve your security monitoring and response time, while maintaining your ability to continually deploy changes.
The Case For Continuous Security
The Case For Continuous Security
Threat Stack
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Innovation Network Technologies: InNet
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Innovation Network Technologies: InNet
In this talk we will look at the current attacker community as well as the tactics and capabilities that are currently being leveraged against targets across the globe. We will then go into the financial mechanics behind both financial based cybercrime as well as nationstate espionage. We will touch on some of the scary capabilities of attackers and try to work thru the reason why we still aren’t seeing the broad scale destructive attacks that everyone has been predicting for years. By Jim Walter, Senior Research Scientist, Cylance
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
Cylance
User-mode hooking is dead. It’s also considered harmful due to interference with OS-level exploit mitigations like Control Flow Guard (CFG). At BlackHat US 2016, the “Captain Hook” talk revealed there were multiple serious security issues in AV hooking — we will put the final nail in the coffin by showing how trivial it is to bypass user-mode hooks. We will demonstrate a universal user-mode unhooking approach that can be included in any binary to blind security software from monitoring code execution and perform heuristic analysis. The tool and source code will be released on GitHub after the talk. Alex Matrosov | Principal Research Scientist Jeff Tang | Senior Security Researcher
You're Off the Hook: Blinding Security Software
You're Off the Hook: Blinding Security Software
Cylance
Keep your company out of the news and your IT organization running smoothly. See how Intelligent Compliance closes the gap that separates IT Security from IT Operations teams – the SecOps gap. http://www.bmc.com/it-solutions/intelligent-compliance.html
How to Close the SecOps Gap
How to Close the SecOps Gap
BMC Software
Answering the question of what threat intelligence is compared to threat data. Is it better to build or buy a solution? Who benefits? Steve presents on how to get started and what you'll need to do to best protect your organization against malicious attackers. By Steve Mancini, Senior Director of Security, Cylance
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
Cylance
"The Spirit Of Innovation Runs Deep In The UK And There Are Plenty Of Thriving Young Companies – Here Are Ten That Look Set For Success In 2017" The Following Information is a Breakdown of Raconteur’s "Next Household Names in UK Digital Article" See ref below: Woollacott, Emma. "Next Household Names in UK Digital." Raconteur. Raconteur Media Ltd., 19 Jan. 2017. Web. 03 Mar. 2017.
10 Hot Digital UK Start-ups To Watch In 2017
10 Hot Digital UK Start-ups To Watch In 2017
Kaitlin McAndrews
Candid Wueest, Cyber Security Conference 2016
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
Cyber Security Alliance
This presentation was delivered by Pierre Gleize, head of the Service Management Practice at Orange Business Services, at the ServiceNow Forum on 8 October in Paris. More information on Customized Infrastructure Care is available here: http://oran.ge/19zNUP8
end-to-end service management with ServiceNow (English)
end-to-end service management with ServiceNow (English)
Orange Business Services
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunications Service Companies - An Product/Service/Solution Innovation Example
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Alan McSweeney
Artificial intelligence (AI) is everywhere, promising self-driving cars, medical breakthroughs, and new ways of working. But how do you separate hype from reality? How can your company apply AI to solve real business problems? Here’s what AI learnings your business should keep in mind for 2017.
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Luminary Labs
Destaque
(12)
The Case For Continuous Security
The Case For Continuous Security
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Protect-Next-Generation Antivirus-Overview
Cylance Information Security: Compromise Assessment Datasheet
Cylance Information Security: Compromise Assessment Datasheet
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
You're Off the Hook: Blinding Security Software
You're Off the Hook: Blinding Security Software
How to Close the SecOps Gap
How to Close the SecOps Gap
Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
10 Hot Digital UK Start-ups To Watch In 2017
10 Hot Digital UK Start-ups To Watch In 2017
Corporations - the new victims of targeted ransomware
Corporations - the new victims of targeted ransomware
end-to-end service management with ServiceNow (English)
end-to-end service management with ServiceNow (English)
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Applying eTOM (enhanced Telecom Operations Map) Framework to Non-Telecommunic...
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
Mais de Cyber Security Alliance
Florian Badertscher, Cyber Security Conference 2016
Bug Bounty @ Swisscom
Bug Bounty @ Swisscom
Cyber Security Alliance
Julien Bachmann, Cyber Security Conference 2016
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
Cyber Security Alliance
Candid Wueest, Cyber Security Conference 2016
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
Cyber Security Alliance
By Bryan Ford #cybsec16
Blockchain for Beginners
Blockchain for Beginners
Cyber Security Alliance
#cybsec16 Rump Session
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
Cyber Security Alliance
Jérémy Matos, Cyber Security Conference 2016
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
Cyber Security Alliance
Keynote by Halvar Flake, Cyber Security Conference 2016
Understanding the fundamentals of attacks
Understanding the fundamentals of attacks
Cyber Security Alliance
Julien Bachmann, Cyber Security Conference 2016
Rump : iOS patch diffing
Rump : iOS patch diffing
Cyber Security Alliance
Joris Van de Vis, Cyber Security Conference 2016
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Cyber Security Alliance
Alain Mowat & Thomas Imbert, Cyber Security Conference 2016
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Cyber Security Alliance
Strong AuthN - MultiOTP
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
Strong AuthN - MultiOTP
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
Cyber Security Alliance
C+ +11 METAPROGRAMMING APPLIED TO SOFTWARE OBFUSCATION
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Cyber Security Alliance
JavaScript controls our lives – we use it to zoom in and out of a map, to automatically schedule doctor appointments and toplay online games. But have we ever properly considered thesecurity state of this scripting language? Before dismissing the (in)security posture of JavaScript on the grounds of a client-side problem, consider the impact ofJavaScript vulnerability exploitation to the enterprise: from stealing serverside data to infecting users with malware. Hackers are beginning to recognize this new playground and are quicklyadding JavaScript exploitation tools to their Web attack arsenal.
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Cyber Security Alliance
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Cyber Security Alliance
1
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
Cyber Security Alliance
1
Operation emmental appsec
Operation emmental appsec
Cyber Security Alliance
s
Hacking the swisscom modem
Hacking the swisscom modem
Cyber Security Alliance
s
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
Cyber Security Alliance
Mais de Cyber Security Alliance
(20)
Bug Bounty @ Swisscom
Bug Bounty @ Swisscom
iOS malware: what's the risk and how to reduce it
iOS malware: what's the risk and how to reduce it
Why huntung IoC fails at protecting against targeted attacks
Why huntung IoC fails at protecting against targeted attacks
Blockchain for Beginners
Blockchain for Beginners
Le pentest pour les nuls #cybsec16
Le pentest pour les nuls #cybsec16
Introducing Man in the Contacts attack to trick encrypted messaging apps
Introducing Man in the Contacts attack to trick encrypted messaging apps
Understanding the fundamentals of attacks
Understanding the fundamentals of attacks
Rump : iOS patch diffing
Rump : iOS patch diffing
An easy way into your sap systems v3.0
An easy way into your sap systems v3.0
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Warning Ahead: SecurityStorms are Brewing in Your JavaScript
Killing any security product … using a Mimikatz undocumented feature
Killing any security product … using a Mimikatz undocumented feature
Rump attaque usb_caralinda_fabrice
Rump attaque usb_caralinda_fabrice
Operation emmental appsec
Operation emmental appsec
Hacking the swisscom modem
Hacking the swisscom modem
Colt sp sec2014_appsec-nf-vfinal
Colt sp sec2014_appsec-nf-vfinal
Robots are among us, but who takes responsibility?
1.
2.
3.
• – – – • – –
4.
• – – • – –
5.
• – – • – – •
6.
7.
• • – • – • – –
8.
• – – •
9.
• – – –
10.
• – – – • – – – – – –
11.
• – • • –
12.
–
13.
• – – • – – • – – • •
14.
• • – – • • – • • –
15.
• – –
16.
• – – • • – – –
17.
• • • – • • • – •
18.
• • • – – •
19.
• • • • •
20.
• • • • •
Baixar agora