Cryptography

Cryptography ,[object Object],[object Object],[object Object],[object Object],[object Object]
Crytpo Intro ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crypto Terms ,[object Object],[object Object],[object Object],[object Object]
Crypto Terms ,[object Object],[object Object],[object Object],[object Object]
One - Time Pad ,[object Object],[object Object],[object Object],[object Object],[object Object]
Cryptanalysis Terms  ,[object Object],[object Object],[object Object],[object Object]
Crypto System Properties ,[object Object],[object Object],[object Object]
Secrecy Requirements ,[object Object],[object Object],[object Object],[object Object]
Authenticity Requirements ,[object Object],[object Object]
Public vs. Private Key Encryption ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encipherment Modes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encipherment Modes ,[object Object],[object Object]
Digital Encryption Standard ( DES) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Applications of DES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Public key ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Strength Comparison
Key Selection ,[object Object],[object Object],[object Object]
Key Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Management Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Escrow ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature ,[object Object],[object Object],[object Object]
Hash Function ,[object Object],[object Object],[object Object],[object Object],[object Object]
Digital Signature Standard (DSS) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Message Authentication Code ,[object Object]
Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Attacks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Kerberos ,[object Object],[object Object],[object Object]
Certificate Authority ,[object Object],[object Object],[object Object],[object Object]
Public Key Infrastructure ,[object Object],[object Object],[object Object],[object Object]
Steganography ,[object Object],[object Object],[object Object],[object Object]
1 von 31

Recomendados

Cryptography and Network Security von
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityPa Van Tanku
4.3K views62 Folien
Cryptography.ppt von
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
34.1K views22 Folien
Cryptography von
CryptographyCryptography
CryptographyIGZ Software house
4.6K views33 Folien
Cryptography Intro von
Cryptography IntroCryptography Intro
Cryptography IntroChristopher Martin
7.1K views17 Folien
Cryptography von
CryptographyCryptography
CryptographyJens Patel
3.6K views33 Folien
Cryptography von
CryptographyCryptography
Cryptographyprasham95
2.1K views22 Folien

Más contenido relacionado

Was ist angesagt?

cryptography von
cryptographycryptography
cryptographyAbhijeet Singh
26.7K views20 Folien
Cryptography ppt von
Cryptography pptCryptography ppt
Cryptography pptAnubhav Sokhal
4.5K views12 Folien
Intro to modern cryptography von
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
2.5K views23 Folien
Cryptography - 101 von
Cryptography - 101Cryptography - 101
Cryptography - 101n|u - The Open Security Community
5.3K views36 Folien
6. cryptography von
6. cryptography6. cryptography
6. cryptography7wounders
5.6K views42 Folien

Was ist angesagt?(20)

Intro to modern cryptography von zahid-mian
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian2.5K views
6. cryptography von 7wounders
6. cryptography6. cryptography
6. cryptography
7wounders5.6K views
Cryptography Fundamentals von Duy Do Phan
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
Duy Do Phan2.4K views
Introduction to Cryptography von Seema Goel
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel1.8K views
Cryptography von gueste4c97e
CryptographyCryptography
Cryptography
gueste4c97e12.9K views
Block Ciphers and the Data Encryption Standard von Dr.Florence Dayana
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
Dr.Florence Dayana3.3K views
Cryptography & Steganography von Animesh Shaw
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw22.8K views
Cryptography and applications von thai
Cryptography and applicationsCryptography and applications
Cryptography and applications
thai8.6K views

Destacado

Public private key von
Public private keyPublic private key
Public private keyStudsPlanet.com
1.8K views12 Folien
Public key cryptography von
Public key cryptographyPublic key cryptography
Public key cryptographyIsrael Herraiz
2.2K views44 Folien
Public Key Authentication With SSH von
Public Key Authentication With SSHPublic Key Authentication With SSH
Public Key Authentication With SSHDon Norwood
2.6K views15 Folien
Public Key Cryptosystem von
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
16.5K views19 Folien
Alice & bob public key cryptography 101 von
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101Joshua Thijssen
16.6K views155 Folien
3 public key cryptography von
3 public key cryptography3 public key cryptography
3 public key cryptographyRutvik Mehta
8.3K views58 Folien

Destacado(20)

Public Key Authentication With SSH von Don Norwood
Public Key Authentication With SSHPublic Key Authentication With SSH
Public Key Authentication With SSH
Don Norwood2.6K views
Public Key Cryptosystem von Devakumar Kp
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp16.5K views
Alice & bob public key cryptography 101 von Joshua Thijssen
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen16.6K views
3 public key cryptography von Rutvik Mehta
3 public key cryptography3 public key cryptography
3 public key cryptography
Rutvik Mehta8.3K views
PUBLIC KEY ENCRYPTION von raf_slide
PUBLIC KEY ENCRYPTIONPUBLIC KEY ENCRYPTION
PUBLIC KEY ENCRYPTION
raf_slide28.9K views
Cryptography.ppt von kusum sharma
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma203.6K views
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks von IDES Editor
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
IDES Editor355 views
Handout infosec defense-mechanism-y3dips von Ammar WK
Handout infosec defense-mechanism-y3dipsHandout infosec defense-mechanism-y3dips
Handout infosec defense-mechanism-y3dips
Ammar WK1.8K views
Contributory broadcast encryption with efficient encryption and short ciphert... von Shakas Technologies
Contributory broadcast encryption with efficient encryption and short ciphert...Contributory broadcast encryption with efficient encryption and short ciphert...
Contributory broadcast encryption with efficient encryption and short ciphert...
Ppt.1 von veeresh35
Ppt.1Ppt.1
Ppt.1
veeresh3519.7K views
Public Key Cryptography von anusachu .
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
anusachu .2.8K views
Message digest & digital signature von Dinesh Kodam
Message digest & digital signatureMessage digest & digital signature
Message digest & digital signature
Dinesh Kodam4.7K views

Similar a Cryptography

Introduction To PKI Technology von
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI TechnologySylvain Maret
5.4K views192 Folien
Ch12 Cryptography it-slideshares.blogspot.com von
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.comphanleson
2K views69 Folien
Cryptography Lecture by Sam Bowne von
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneSecurityTube.Net
1.9K views69 Folien
Elementry Cryptography von
Elementry CryptographyElementry Cryptography
Elementry CryptographyTata Consultancy Services
6K views30 Folien
Seminar on Encryption and Authenticity von
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
1.1K views31 Folien
Secrity project keyvan von
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvanitrraincity
542 views51 Folien

Similar a Cryptography(20)

Introduction To PKI Technology von Sylvain Maret
Introduction To PKI TechnologyIntroduction To PKI Technology
Introduction To PKI Technology
Sylvain Maret5.4K views
Ch12 Cryptography it-slideshares.blogspot.com von phanleson
Ch12 Cryptography it-slideshares.blogspot.comCh12 Cryptography it-slideshares.blogspot.com
Ch12 Cryptography it-slideshares.blogspot.com
phanleson2K views
Seminar on Encryption and Authenticity von Hardik Manocha
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
Hardik Manocha1.1K views
Secrity project keyvan von itrraincity
Secrity project   keyvanSecrity project   keyvan
Secrity project keyvan
itrraincity542 views
Computer Security (Cryptography) Ch01 von Saif Kassim
Computer Security (Cryptography) Ch01Computer Security (Cryptography) Ch01
Computer Security (Cryptography) Ch01
Saif Kassim493 views
Cryptography /Sankar jayam von tasankar14
Cryptography /Sankar jayamCryptography /Sankar jayam
Cryptography /Sankar jayam
tasankar14198 views
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-... von ams1ams11
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams116 views
Java Crypto von phanleson
Java CryptoJava Crypto
Java Crypto
phanleson2.5K views
Cryptography - An Overview von ppd1961
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd19617.3K views
Computer System Security (UNIT IV) For AKTU Lucknow von Brijesh Vishwakarma
Computer System Security (UNIT IV) For AKTU LucknowComputer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma1.6K views

Más de amiable_indian

Phishing As Tragedy of the Commons von
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commonsamiable_indian
2.8K views12 Folien
Cisco IOS Attack & Defense - The State of the Art von
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art amiable_indian
3.2K views65 Folien
Secrets of Top Pentesters von
Secrets of Top PentestersSecrets of Top Pentesters
Secrets of Top Pentestersamiable_indian
3.6K views19 Folien
Workshop on Wireless Security von
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
3.5K views45 Folien
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and... von
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...amiable_indian
4.7K views44 Folien
Workshop on BackTrack live CD von
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
3.2K views25 Folien

Más de amiable_indian(20)

Phishing As Tragedy of the Commons von amiable_indian
Phishing As Tragedy of the CommonsPhishing As Tragedy of the Commons
Phishing As Tragedy of the Commons
amiable_indian2.8K views
Cisco IOS Attack & Defense - The State of the Art von amiable_indian
Cisco IOS Attack & Defense - The State of the Art Cisco IOS Attack & Defense - The State of the Art
Cisco IOS Attack & Defense - The State of the Art
amiable_indian3.2K views
Workshop on Wireless Security von amiable_indian
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
amiable_indian3.5K views
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and... von amiable_indian
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
Insecure Implementation of Security Best Practices: of hashing, CAPTCHA's and...
amiable_indian4.7K views
Workshop on BackTrack live CD von amiable_indian
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian3.2K views
Reverse Engineering for exploit writers von amiable_indian
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian2.3K views
State of Cyber Law in India von amiable_indian
State of Cyber Law in IndiaState of Cyber Law in India
State of Cyber Law in India
amiable_indian1.4K views
AntiSpam - Understanding the good, the bad and the ugly von amiable_indian
AntiSpam - Understanding the good, the bad and the uglyAntiSpam - Understanding the good, the bad and the ugly
AntiSpam - Understanding the good, the bad and the ugly
amiable_indian2.9K views
Reverse Engineering v/s Secure Coding von amiable_indian
Reverse Engineering v/s Secure CodingReverse Engineering v/s Secure Coding
Reverse Engineering v/s Secure Coding
amiable_indian819 views
Network Vulnerability Assessments: Lessons Learned von amiable_indian
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
amiable_indian1.3K views
Economic offenses through Credit Card Frauds Dissected von amiable_indian
Economic offenses through Credit Card Frauds DissectedEconomic offenses through Credit Card Frauds Dissected
Economic offenses through Credit Card Frauds Dissected
amiable_indian12.8K views
Immune IT: Moving from Security to Immunity von amiable_indian
Immune IT: Moving from Security to ImmunityImmune IT: Moving from Security to Immunity
Immune IT: Moving from Security to Immunity
amiable_indian821 views
Reverse Engineering for exploit writers von amiable_indian
Reverse Engineering for exploit writersReverse Engineering for exploit writers
Reverse Engineering for exploit writers
amiable_indian2.1K views
Hacking Client Side Insecurities von amiable_indian
Hacking Client Side InsecuritiesHacking Client Side Insecurities
Hacking Client Side Insecurities
amiable_indian2.5K views
Web Exploit Finder Presentation von amiable_indian
Web Exploit Finder PresentationWeb Exploit Finder Presentation
Web Exploit Finder Presentation
amiable_indian1.3K views
Network Security Data Visualization von amiable_indian
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
amiable_indian7K views
Enhancing Computer Security via End-to-End Communication Visualization von amiable_indian
Enhancing Computer Security via End-to-End Communication Visualization Enhancing Computer Security via End-to-End Communication Visualization
Enhancing Computer Security via End-to-End Communication Visualization
amiable_indian819 views
Top Network Vulnerabilities Over Time von amiable_indian
Top Network Vulnerabilities Over TimeTop Network Vulnerabilities Over Time
Top Network Vulnerabilities Over Time
amiable_indian647 views
What are the Business Security Metrics? von amiable_indian
What are the Business Security Metrics? What are the Business Security Metrics?
What are the Business Security Metrics?
amiable_indian565 views

Último

Uni Systems for Power Platform.pptx von
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
61 views21 Folien
The Power of Heat Decarbonisation Plans in the Built Environment von
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
69 views20 Folien
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueShapeBlue
93 views15 Folien
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...ShapeBlue
144 views12 Folien
"Surviving highload with Node.js", Andrii Shumada von
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada Fwdays
53 views29 Folien
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
101 views17 Folien

Último(20)

The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue von ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... von ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
"Surviving highload with Node.js", Andrii Shumada von Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays53 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... von ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online von ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 views
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... von ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue79 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... von Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T von ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue112 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows von Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... von ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 views
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue von ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views

Cryptography

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.