Weiter zum Inhalt
UB der TUM
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporäre Merkliste: 0 temporär gemerkt (Voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Informationen Fernleihe
  • Chat
  • Tools
    • Suchhistorie
    • Freie Fernleihe
    • Erwerbungsvorschlag
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren/Gebühren
    • Profil
    • Suchhistorie
  • Log out
  • Login
  • Bücher & Journals
  • Papers
Erweitert
  • Securing the Future
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Datensatz exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach RIS
  • Zur Merkliste hinzufügen
  • Temporär merken Aus der temporären Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Beteiligte Personen: H L, Gururaj (VerfasserIn), M, Spoorthi (VerfasserIn), Ravi, Vinayakumar (VerfasserIn), J, Shreyas (VerfasserIn), Roy, Kumar Sekhar (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Cham Springer Nature Switzerland 2024
Cham Springer
Ausgabe:1st ed. 2024
Schriftenreihe:SpringerBriefs in Computational Intelligence
Schlagwörter:
Computational Intelligence
Data and Information Security
Computational intelligence
Data protection
Links:https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
https://doi.org/10.1007/978-3-031-63781-0
Umfang:1 Online-Ressource (XV, 87 p. 17 illus., 16 illus. in color)
ISBN:9783031637810
ISSN:2625-3712
DOI:10.1007/978-3-031-63781-0
Internformat

MARC

LEADER 00000nam a2200000zcb4500
001 BV049818187
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 240813s2024 xx o|||| 00||| eng d
020 |a 9783031637810  |c Online  |9 978-3-031-63781-0 
024 7 |a 10.1007/978-3-031-63781-0  |2 doi 
035 |a (ZDB-2-INR)9783031637810 
035 |a (OCoLC)1454755836 
035 |a (DE-599)BVBBV049818187 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-863  |a DE-634  |a DE-M347  |a DE-1028  |a DE-1050  |a DE-522  |a DE-739  |a DE-Aug4  |a DE-523  |a DE-92  |a DE-706  |a DE-573  |a DE-862  |a DE-29  |a DE-91  |a DE-1043  |a DE-1046  |a DE-898 
082 0 |a 006.3  |2 23 
084 |a DAT 000  |2 stub 
100 1 |a H L, Gururaj  |e Verfasser  |4 aut 
245 1 0 |a Securing the Future  |b Introduction to Zero Trust in Cybersecurity  |c by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy 
250 |a 1st ed. 2024 
264 1 |a Cham  |b Springer Nature Switzerland  |c 2024 
264 1 |a Cham  |b Springer 
300 |a 1 Online-Ressource (XV, 87 p. 17 illus., 16 illus. in color) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 0 |a SpringerBriefs in Computational Intelligence  |x 2625-3712 
650 4 |a Computational Intelligence 
650 4 |a Data and Information Security 
650 4 |a Computational intelligence 
650 4 |a Data protection 
700 1 |a M, Spoorthi  |4 aut 
700 1 |a Ravi, Vinayakumar  |4 aut 
700 1 |a J, Shreyas  |4 aut 
700 1 |a Roy, Kumar Sekhar  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-63780-3 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-031-63782-7 
856 4 0 |u https://doi.org/10.1007/978-3-031-63781-0  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-INR 
940 1 |q ZDB-2-INR_2024 
943 1 |a oai:aleph.bib-bvb.de:BVB01-035158424 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-522  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-634  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-1043  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-1046  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-1028  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-Aug4  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-1050  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-573  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-M347  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-92  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-898  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-863  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-862  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-523  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-91  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-706  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-29  |p ZDB-2-INR  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-031-63781-0  |l DE-739  |p ZDB-2-INR  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-OTHR_katkey 7011603
DE-BY-TUM_katkey 2805481
_version_ 1831257860003069953
any_adam_object
author H L, Gururaj
M, Spoorthi
Ravi, Vinayakumar
J, Shreyas
Roy, Kumar Sekhar
author_facet H L, Gururaj
M, Spoorthi
Ravi, Vinayakumar
J, Shreyas
Roy, Kumar Sekhar
author_role aut
aut
aut
aut
aut
author_sort H L, Gururaj
author_variant l g h lg lgh
s m sm
v r vr
s j sj
k s r ks ksr
building Verbundindex
bvnumber BV049818187
classification_tum DAT 000
collection ZDB-2-INR
ctrlnum (ZDB-2-INR)9783031637810
(OCoLC)1454755836
(DE-599)BVBBV049818187
dewey-full 006.3
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 006 - Special computer methods
dewey-raw 006.3
dewey-search 006.3
dewey-sort 16.3
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-031-63781-0
edition 1st ed. 2024
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03599nam a2200709zcb4500</leader><controlfield tag="001">BV049818187</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240813s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031637810</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-63781-0</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-63781-0</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-INR)9783031637810</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1454755836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049818187</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-1028</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">H L, Gururaj</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing the Future</subfield><subfield code="b">Introduction to Zero Trust in Cybersecurity</subfield><subfield code="c">by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer Nature Switzerland</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XV, 87 p. 17 illus., 16 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computational Intelligence</subfield><subfield code="x">2625-3712</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">M, Spoorthi</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ravi, Vinayakumar</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">J, Shreyas</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roy, Kumar Sekhar</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-63780-3</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-63782-7</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-INR</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-INR_2024</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035158424</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-522</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-1028</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-63781-0</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-INR</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV049818187
illustrated Not Illustrated
indexdate 2024-12-20T20:22:45Z
institution BVB
isbn 9783031637810
issn 2625-3712
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-035158424
oclc_num 1454755836
open_access_boolean
owner DE-863
DE-BY-FWS
DE-634
DE-M347
DE-1028
DE-1050
DE-522
DE-739
DE-Aug4
DE-523
DE-92
DE-706
DE-573
DE-862
DE-BY-FWS
DE-29
DE-91
DE-BY-TUM
DE-1043
DE-1046
DE-898
DE-BY-UBR
owner_facet DE-863
DE-BY-FWS
DE-634
DE-M347
DE-1028
DE-1050
DE-522
DE-739
DE-Aug4
DE-523
DE-92
DE-706
DE-573
DE-862
DE-BY-FWS
DE-29
DE-91
DE-BY-TUM
DE-1043
DE-1046
DE-898
DE-BY-UBR
physical 1 Online-Ressource (XV, 87 p. 17 illus., 16 illus. in color)
psigel ZDB-2-INR
ZDB-2-INR_2024
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher Springer Nature Switzerland
Springer
record_format marc
series2 SpringerBriefs in Computational Intelligence
spellingShingle H L, Gururaj
M, Spoorthi
Ravi, Vinayakumar
J, Shreyas
Roy, Kumar Sekhar
Securing the Future Introduction to Zero Trust in Cybersecurity
Computational Intelligence
Data and Information Security
Computational intelligence
Data protection
title Securing the Future Introduction to Zero Trust in Cybersecurity
title_auth Securing the Future Introduction to Zero Trust in Cybersecurity
title_exact_search Securing the Future Introduction to Zero Trust in Cybersecurity
title_full Securing the Future Introduction to Zero Trust in Cybersecurity by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy
title_fullStr Securing the Future Introduction to Zero Trust in Cybersecurity by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy
title_full_unstemmed Securing the Future Introduction to Zero Trust in Cybersecurity by Gururaj H L, Spoorthi M, Vinayakumar Ravi, Shreyas J, Kumar Sekhar Roy
title_short Securing the Future
title_sort securing the future introduction to zero trust in cybersecurity
title_sub Introduction to Zero Trust in Cybersecurity
topic Computational Intelligence
Data and Information Security
Computational intelligence
Data protection
topic_facet Computational Intelligence
Data and Information Security
Computational intelligence
Data protection
url https://doi.org/10.1007/978-3-031-63781-0
work_keys_str_mv AT hlgururaj securingthefutureintroductiontozerotrustincybersecurity
AT mspoorthi securingthefutureintroductiontozerotrustincybersecurity
AT ravivinayakumar securingthefutureintroductiontozerotrustincybersecurity
AT jshreyas securingthefutureintroductiontozerotrustincybersecurity
AT roykumarsekhar securingthefutureintroductiontozerotrustincybersecurity
  • Verfügbarkeit
Bestellen (Login erforderlich)
Online lesen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt