Muutke küpsiste eelistusi

E-raamat: CompTIA Cloud+ CV0-003 Exam Cram

  • Formaat: 432 pages
  • Sari: Exam Cram
  • Ilmumisaeg: 20-Dec-2021
  • Kirjastus: Pearson IT Certification
  • Keel: eng
  • ISBN-13: 9780137393152
  • Formaat - EPUB+DRM
  • Hind: 35,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 432 pages
  • Sari: Exam Cram
  • Ilmumisaeg: 20-Dec-2021
  • Kirjastus: Pearson IT Certification
  • Keel: eng
  • ISBN-13: 9780137393152

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Using the proven Exam Cram method of study, CompTIA Cloud+ CV0-003 Exam Cram offers comprehensive foundational learning for cloud architecture, design, security, deployment, operations, support, and troubleshooting, with every chapter mapped directly to the exam objectives.

Extensive preparation tools include:

  • topic overviews
  • exam alerts
  • CramSavers
  • CramQuizzes
  • chapter-ending review questions
  • author notes and tips
  • an extensive glossary

The handy Cram Sheet tear-out brings together:

  • tips
  • acronyms
  • memory joggers

The powerful Pearson Test Prep practice test software offers an extensive collection of exam-realistic practice questions, with many customization and reporting features: practice in study mode, practice exam mode, or flash card mode. The companion website also provides access to several digital assets including the Glossary and Cram Sheet.



CompTIA® Cloud+ CV0-003 Exam Cram is an all-inclusive study guide designed to help you pass the updated version of the CompTIA Cloud+ exam. Prepare for test day success with complete coverage of exam objectives and topics, plus hundreds of realistic practice questions. Extensive prep tools include quizzes and our essential last-minute review CramSheet. The powerful Pearson Test Prep practice software provides real-time assessment and feedback with two complete exams.


Covers the critical information needed to score higher on your Cloud+ CV0-003 exam!


  • Understand Cloud architecture and design
  • Secure a network in a Cloud environment
  • Apply data security and compliance controls and implement measures to meet security requirements
  • Deploy Cloud networking solutions
  • Perform Cloud migrations
  • Optimize and maintain efficient operation of a Cloud environment
  • Understand disaster recovery tasks
  • Troubleshoot security, deployment, connectivity, and other performance issues


Prepare for your exam with Pearson Test Prep


  • Realistic practice questions and answers
  • Comprehensive reporting and feedback
  • Customized testing in study, practice exam, or flash card modes
  • Complete coverage of Cloud+ CV0-003 exam objectives

Introduction xxvi
Chapter 1 Different Types of Cloud Models 1(14)
Cloud Deployment Models
2(4)
Public Cloud
3(1)
Private Cloud
4(1)
Hybrid Cloud
4(1)
Community Cloud
5(1)
Cloud Within a Cloud
5(1)
Multicloud
6(1)
Multitenancy
6(1)
Cloud Service Models
6(3)
Infrastructure as a Service (IaaS)
7(1)
Platform as a Service (PaaS)
8(1)
Software as a Service (SaaS)
8(1)
Advanced Cloud Services
9(2)
Internet of Things (IoT)
9(1)
Serverless
9(1)
Machine Learning/Artificial Intelligence (AI)
10(1)
Cloud Shared Responsibility Model
11(3)
What Next?
14(1)
Chapter 2 Capacity Planning 15(10)
Requirements
16(2)
Hardware Requirements
16(1)
Software Requirements
17(1)
Budgetary Requirements
17(1)
Business Need Analysis
17(1)
Standard Templates
18(1)
Licensing
18(2)
Per-user
19(1)
Socket-based
19(1)
Volume-based
19(1)
Core-based
19(1)
Subscription
20(1)
User Density
20(1)
System Load
21(1)
Trend Analysis
21(1)
Baselines
21(1)
Patterns
22(1)
Anomalies
22(1)
Performance Capacity Planning
22(2)
What Next?
24(1)
Chapter 3 High Availability and Scaling in Cloud Environments 25(16)
Hypervisors
26(2)
Affinity
27(1)
Anti-affinity
27(1)
Oversubscription
28(2)
Compute
28(1)
Network
29(1)
Storage
30(1)
Regions and Zones
30(2)
Applications
32(1)
Containers
32(1)
Clusters
33(1)
High Availability of Network Functions
33(3)
Switches
33(1)
Routers
33(1)
Load Balancers
34(1)
Firewalls
35(1)
Avoid Single Points of Failure
36(1)
Scalability
36(3)
Auto-scaling
36(1)
Horizontal Scaling
37(1)
Vertical Scaling
37(1)
Cloud Bursting
37(2)
What Next?
39(2)
Chapter 4 Solution Design in Support of the Business Requirements 41(14)
Requirement Analysis
42(6)
Software
42(1)
Hardware
43(2)
Integration
45(1)
Budgetary
45(1)
Compliance
46(1)
Service-Level Agreement (SLA)
46(1)
User and Business Needs
46(1)
Security
46(1)
Network Requirements
47(1)
Environments
48(2)
Development
48(1)
Quality Assurance (QA)
48(1)
Staging
49(1)
Blue-Green
49(1)
Production
49(1)
Disaster Recovery (DR)
49(1)
Testing Techniques
50(3)
Vulnerability Testing
50(1)
Penetration Testing
50(1)
Performance Testing
51(1)
Regression Testing
51(1)
Functional Testing
51(1)
Usability Testing
51(2)
What Next?
53(2)
Chapter 5 Identity and Access Management 55(16)
Identification and Authorization
56(4)
Privileged Access Management (PAM)
57(1)
Logical Access Management
57(1)
Account Lifecycle Management
58(1)
Access Controls
59(1)
Directory Services
60(1)
Lightweight Directory Access Protocol (LDAP)
61(1)
Federation
61(2)
Certificate Management
63(1)
Multifactor Authentication (MFA)
64(1)
Single Sign-On (SSO)
65(1)
Security Assertion Markup Language (SAML)
66(1)
Public Key Infrastructure (PM)
66(1)
Secret Management
67(1)
Key Management
67(2)
What Next?
69(2)
Chapter 6 Secure a Network in a Cloud Environment 71(16)
Network Segmentation
72(2)
Virtual LAN (VLAN)/Virtual Extensible LAN (VxLAN)/Generic Network Virtualization Encapsulation (GENEVE)
72(1)
Microsegmentation
73(1)
Tiering
73(1)
Protocols
74(3)
Domain Name Service (DNS)
74(1)
Network Time Protocol (NTP)
75(1)
Network Time Security (NTS)
75(1)
Encryption
75(1)
Tunneling
76(1)
Network Services
77(3)
Firewalls
78(1)
Web Application Firewall (WAF)
78(1)
Application Delivery Controller (ADC)
79(1)
Intrusion Protection System (IPS)/Intrusion Detection System (IDS)
79(1)
Data Loss Prevention (DLP)
79(1)
Network Access Control (NAC)
79(1)
Packet Brokers
80(1)
Log and Event Monitoring
80(1)
Network Flows
80(1)
Hardening and Configuration Changes
81(5)
Disabling Unnecessary Ports and Services
81(1)
Disabling Weak Protocols and Ciphers
81(1)
Firmware Upgrades
82(1)
Control Ingress and Egress Traffic
82(2)
Distributed Denial-of-Service (DDoS) Protection
84(2)
What Next?
86(1)
Chapter 7 OS and Application Security Controls 87(16)
Policies
88(2)
Password Complexity
88(1)
Account Lockout
89(1)
Application Whitelisting
89(1)
Software Feature
90(1)
User/Group
90(1)
User Permissions
90(3)
Antivirus/Antimalware/Endpoint Detection and Response (EDR)
93(1)
Host-Based IDS (HIDS)/Host-Based IPS (HIPS)
94(1)
Hardened Baselines
94(2)
Single Function
95(1)
File Integrity
96(1)
Log and Event Monitoring
96(1)
Configuration Management
96(1)
Builds
96(2)
Stable
96(1)
Long-Term Support (LTS)
97(1)
Beta
97(1)
Canary
97(1)
Operating System (OS) Upgrades
98(1)
Encryption
98(1)
Application Programming Interface (API) Endpoint
98(1)
Application
98(1)
OS
98(1)
Storage
98(1)
Filesystem
99(1)
Mandatory Access Control
99(1)
Firewall Software
100(1)
What Next?
101(2)
Chapter 8 Data Security and Compliance Controls in Cloud Environments 103(12)
Encryption
104(1)
Integrity
105(2)
Hashing Algorithms
105(1)
Digital Signatures
106(1)
File Integrity Monitoring (FIM)
106(1)
Classification
107(1)
Segmentation
108(1)
Access Control
108(1)
Impact of Laws and Regulations
109(1)
Legal Hold
109(1)
Records Management
110(1)
Versioning
110(1)
Retention
110(1)
Destruction
110(1)
Write Once Read Many
110(1)
Data Loss Prevention (DLP)
111(1)
Cloud Access Security Broker (CASB)
111(2)
What Next?
113(2)
Chapter 9 Security Requirements 115(8)
Tools
116(1)
Vulnerability Scanners
116(1)
Port Scanners
116(1)
Vulnerability Assessment
117(1)
Default and Common Credential Scans
117(1)
Credentialed Scans
118(1)
Network-Based Scans
118(1)
Agent-Based Scans
118(1)
Service Availabilities Scans
118(1)
Security Patches
118(2)
Hot Fixes
119(1)
Scheduled Updates
119(1)
Virtual Patches
119(1)
Signature Updates
119(1)
Rollups
120(1)
Risk Register
120(1)
Prioritization of Patch Applications
120(1)
Deactivate Default Accounts
120(1)
Impacts of Security Tools on Systems and Services
121(1)
What Next?
122(1)
Chapter 10 Incident Response Procedures 123(12)
Preparation
124(6)
Documentation
124(1)
Call Trees
125(1)
Training
126(1)
Tabletops
126(1)
Documented Incident Types/Categories
127(1)
Roles and Responsibilities
128(2)
Incident Response Procedures
130(4)
Identification
130(1)
Containment, Eradication, and Recovery
131(1)
Postincident and Lessons Learned
132(2)
What Next?
134(1)
Chapter 11 Integrate Components into a Cloud Solution 135(14)
Subscription Services
136(4)
File Subscriptions
137(1)
Communications
137(1)
Collaboration
138(1)
Virtual Desktop Infrastructure (VDI)
138(1)
Directory and Identity Services
139(1)
Cloud Resources
139(1)
IaaS
140(1)
PaaS
140(1)
SaaS
140(1)
Provisioning Resources
140(2)
Compute
141(1)
Storage
141(1)
Network
142(1)
Application
142(1)
Serverless
143(1)
Deploying Virtual Machines (VMs) and Custom Images
143(1)
Templates
143(2)
OS Templates
143(1)
Solution Templates
144(1)
Identity Management
145(1)
Containers
145(1)
Configure Variables
145(1)
Configure Secrets
145(1)
Persistent Storage
146(1)
Auto-scaling
146(1)
Postdeployment Validation
146(2)
What Next?
148(1)
Chapter 12 Storage in Cloud Environments 149(16)
Types
150(2)
Block
150(1)
File
151(1)
Object
151(1)
Tiers
152(1)
Flash
152(1)
Hybrid
152(1)
Spinning Disks
152(1)
Long-Term
152(1)
Input/Output Operations per Second (LOPS) and Read/Write
153(1)
Protocols
154(3)
Network File System (NFS)
154(1)
Common Internet File System (CIFS)
155(1)
Internet Small Computer System Interface (iSCSI)
155(1)
Fibre Channel (FC)
156(1)
Non-Volatile Memory Express over Fabrics (NVMe-oF)
156(1)
Redundant Array of Inexpensive Disks (RAID)
157(2)
0
157(1)
1
158(1)
5
158(1)
6
159(1)
10
159(1)
Storage System Features
159(2)
Compression
160(1)
Deduplication
160(1)
Thin Provisioning
160(1)
Thick Provisioning
161(1)
Replication
161(1)
User Quotas
161(1)
Hyperconverged
161(1)
Software-Defined Storage (SDS)
162(1)
What Next?
163(2)
Chapter 13 Cloud Networking Solutions 165(16)
Services
166(4)
Dynamic Host Configuration Protocol (DHCP)
166(1)
Network Time Protocol (NTP)
166(1)
Domain Name Service (DNS)
167(2)
Content Delivery Network (CDN)
169(1)
IP Address Management (IPAM)
170(1)
Virtual Private Networks (VPNs)
170(1)
Site-to-site
170(1)
Point-to-Point
171(1)
Point-to-Site
171(1)
IPsec
171(1)
Multiprotocol Label Switching (MPLS)
171(1)
Virtual Routing
171(5)
Dynamic and Static Routing
172(1)
Virtual Network Interface Controller (vNIC)
172(1)
Subnetting
172(4)
Network Appliances
176(1)
Load Balancers
176(1)
Firewalls
177(1)
Virtual Private Cloud (VPC)
177(1)
Hub and Spoke
178(1)
Peering
178(1)
VLAN/VxLAN/GENEVE
178(1)
Single Root Input/Output Virtualization (SR-IOV)
179(1)
Software-Defined Network (SDN)
179(1)
What Next?
180(1)
Chapter 14 Compute Sizing for a Deployment 181(12)
Virtualization
182(3)
Hypervisors
182(2)
Simultaneous Multithreading (SMT)
184(1)
Dynamic Allocations
185(1)
Oversubscription
185(1)
Central Processing Unit (CPU)/Virtual CPU (vCPU)
185(1)
Graphics Processing Unit (GPU)
186(1)
Virtual
186(1)
Pass-through
186(1)
Clock Speed/Instructions per Cycle (IPC)
187(1)
Hyperconverged
188(1)
Memory
188(3)
Dynamic Allocation
189(1)
Ballooning
189(2)
What Next?
191(2)
Chapter 15 Cloud Migrations 193(12)
Physical to Virtual (P2V)
194(1)
Virtual to Virtual (V2V)
195(1)
Cloud-to-Cloud Migrations
196(2)
Vendor Lock-in
196(1)
PaaS or SaaS Migrations
196(2)
Storage Migrations
198(2)
Block
199(1)
File
199(1)
Object
200(1)
Database Migrations
200(3)
Relational
201(1)
Nonrelational
201(2)
What Next?
203(2)
Chapter 16 Logging, Monitoring, and Alerting 205(12)
Logging
206(3)
Collectors
206(1)
Analysis
207(1)
Severity Categorization
207(1)
Audits
208(1)
Types
208(1)
Automation
209(1)
Trending
209(1)
Monitoring
209(5)
Baselines
210(1)
Thresholds
210(1)
Tagging
210(1)
Log Scrubbing
211(1)
Performance Monitoring
211(1)
Resource Utilization
212(1)
Availability
212(1)
Verification of Continuous Monitoring Activities
213(1)
Service Management Tool Integration
213(1)
Alerting
214(2)
Common Messaging Methods
214(1)
Enable/Disable Alerts
214(1)
Appropriate Responses
214(1)
Policies for Categorizing and Communicating Alerts
215(1)
What Next?
216(1)
Chapter 17 Operation of a Cloud Environment 217(18)
Confirm Completion of Backups
218(1)
Lifecycle Management
218(2)
Roadmaps
218(1)
Old/Current/New Versions
219(1)
Upgrading and Migrating Systems
219(1)
Deprecations or End of Life
220(1)
Change Management
220(1)
Asset Management
220(1)
Configuration Management Database (CMDB)
221(1)
Patching
221(5)
Features or Enhancements
221(1)
Fixes for Broken or Critical Infrastructure or Applications
222(1)
Scope of Cloud Elements to Be Patched
222(2)
Software
224(1)
Policies
225(1)
Rollbacks
225(1)
Impacts of Process Improvements on Systems
226(1)
Upgrade Methods
226(2)
Rolling Upgrades
226(1)
Blue-Green
227(1)
Canary
227(1)
Active-Passive
227(1)
Development/QA/Production/DR
227(1)
Dashboard and Reporting
228(6)
Tagging
229(1)
Costs
229(2)
Elasticity Usage
231(1)
Connectivity
231(1)
Latency
231(1)
Capacity
232(1)
Incidents
232(1)
Health
232(1)
Overall Utilization
233(1)
Availability
233(1)
What Next?
234(1)
Chapter 18 Optimize Cloud Environments 235(12)
Right-sizing
236(1)
Compute and Storage
236(1)
Network
237(5)
Bandwidth
237(2)
Network Interface Controllers (NICs)
239(1)
Latency
240(1)
Software-Defined Networks (SDNs)
241(1)
Edge Computing
241(1)
Placement
242(1)
Geographical
242(1)
Cluster Placement
242(1)
Redundancy
243(1)
Colocation
243(1)
Device Drivers and Firmware
243(3)
Generic
244(1)
Vendor
244(1)
Open Source
245(1)
What Next?
246(1)
Chapter 19 Automation and Orchestration Techniques 247(12)
Infrastructure as Code (IaC)
248(1)
Infrastructure Components and Their Integration
249(1)
Continuous Integration/Continuous Deployment (Cl/CD)
249(1)
Version Control
250(1)
Configuration Management
251(1)
Playbook
252(1)
Containers
252(1)
Automation Activities
252(2)
Routine Operations
253(1)
Updates
253(1)
Scaling
253(1)
Shutdowns
254(1)
Restarts
254(1)
Create Internal APIs
254(1)
Secure Scripting
254(1)
No Hardcoded Passwords
255(1)
Use of Individual Service Accounts
255(1)
Password Vaults
255(1)
Key-Based Authentication
255(1)
Orchestration Sequencing
255(2)
What Next?
257(2)
Chapter 20 Backup and Restore Operations 259(14)
Backup Types
260(3)
Incremental
260(1)
Differential
261(1)
Full
261(1)
Synthetic Full
262(1)
Snapshot
262(1)
Backup Objects
263(2)
Application-Level Backup
263(1)
File-System Backup
264(1)
Database Dumps
264(1)
Configuration Files
264(1)
Backup Targets
265(1)
Tape
265(1)
Disk
265(1)
Object
266(1)
Backup and Restore Policies
266(3)
Retention
266(1)
Schedules
267(1)
Location
267(1)
Service-Level Agreements (SLAB)
268(1)
Recovery Time Objective (RTO)
268(1)
Recovery Point Objective (RPO)
268(1)
Mean Time to Recovery (MTTR)
269(1)
3-2-1 Rule
269(1)
Restoration Methods
269(3)
In Place
269(1)
Alternate Location
270(1)
Restore Files
270(1)
Snapshot
270(2)
What Next?
272(1)
Chapter 21 Disaster Recovery Tasks 273(8)
Failovers
274(1)
Failback
274(1)
Restore Backups
275(1)
Replication
275(1)
On-Premises and Cloud Sites
275(2)
Hot
275(1)
Warm
276(1)
Cold
276(1)
Requirements
277(1)
Corporate Guidelines
277(1)
Documentation
277(2)
DR Kit
278(1)
Playbook
278(1)
Network Diagram
278(1)
Geographical Data Center Requirements
279(1)
What Next?
280(1)
Chapter 22 Troubleshooting Methodology 281(8)
Always Consider Corporate Policies, Procedures, and Impacts Before Implementing Changes
282(6)
1 Identify the Problem
283(1)
2 Establish a Theory of Probable Cause (Question the Obvious)
284(1)
3 Test the Theory to Determine Cause
285(1)
4 Establish a Plan of Action to Resolve the Problem and Implement the Solution
285(1)
5 Verify Full System Functionality and, if Applicable, Implement Preventive Measures
286(1)
6 Document the Findings, Actions, and Outcomes Throughout the Process
286(2)
What Next?
288(1)
Chapter 23 Troubleshoot Security Issues 289(12)
Privilege
290(1)
Missing
290(1)
Incomplete
290(1)
Escalation
291(1)
Keys
291(1)
Authentication
291(1)
Authorization
292(1)
Security Groups
293(1)
Network Security Groups
293(1)
Directory Security Groups
294(1)
Keys and Certificates
294(1)
Expired
294(1)
Revoked
295(1)
Trust
295(1)
Compromised
295(1)
Misconfigured
295(1)
Misconfigured or Misapplied Policies
295(1)
Data Security Issues
296(1)
Unencrypted Data
296(1)
Data Breaches
296(1)
Misclassification
296(1)
Lack of Encryption in Protocols
296(1)
Insecure Ciphers
297(1)
Exposed Endpoints
297(1)
Misconfigured or Failed Security Appliances
298(1)
Unsupported Protocols
298(1)
External/Internal Attacks
298(2)
What Next?
300(1)
Chapter 24 Troubleshoot Deployment, Automation, and Orchestration Issues 301(16)
Connectivity Issues
302(2)
Cloud Service Provider (CSP) or Internet Service Provider (ISP) Outages
302(2)
Performance Degradation
304(1)
Latency
304(1)
Configurations
305(1)
Scripts
305(1)
Applications in Containers
306(1)
Misconfigured Templates
306(1)
Missing or Incorrect Tags
306(1)
Insufficient Capacity
307(1)
Licensing Issues
307(1)
Vendor-Related Issues
308(2)
Migrations of Vendors or Platforms
308(1)
Integration of Vendors or Platforms
308(1)
API Request Limits
308(1)
Cost or Billing Issues
309(1)
Account Mismatches
310(1)
Change Management Failures
310(1)
Server Name Changes
311(1)
IP Address Changes
311(1)
Location Changes
312(1)
Version/Feature Mismatch
312(1)
Automation Tool Incompatibility
313(1)
Deprecated Features
313(1)
API Version Incompatibility
314(1)
Job Validation Issue
314(1)
Patching Failure
315(1)
What Next?
316(1)
Chapter 25 Troubleshoot Connectivity Issues and Common Performance Issues 317(24)
Network Security Group Misconfigurations
318(1)
Access Control Lists (ACLs)
318(1)
Inheritance
319(1)
Common Networking Configuration Issues
319(5)
Peering
320(1)
Incorrect Subnet, IP Address, and IP Space
320(1)
Routes
321(1)
Firewall
322(1)
Network Address Translation (NAT)
322(1)
Load Balancers and DNS Records
323(1)
VLAN/VxLAN/GENEVE and Proxy
324(1)
Maximum Transmission Unit (MTU)
324(1)
Quality of Service (QoS)
324(1)
Time Synchronization Issues
324(1)
Network Troubleshooting Tools
324(12)
ping
325(1)
tracert/traceroute
325(1)
flushdns
326(1)
ipconfig/ifconfig/ip
326(2)
nslookup/dig
328(2)
netstat/ss
330(2)
route
332(1)
arp
332(1)
curl
333(1)
Packet Capture
334(1)
Packet Analyzer
335(1)
OpenSSL Client
336(1)
Resource Utilization
336(1)
Application
337(1)
Memory Management
337(1)
Service Overload
337(1)
Incorrectly Configured or Failed Load Balancing
338(1)
What Next?
339(2)
Glossary of Essential Terms and Components 341(20)
Index 361
At the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a Trash 80). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this computer thing work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes cloud, Linux, UNIX, IT security, DevOps, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.