SlideShare una empresa de Scribd logo
1 de 32
Descargar para leer sin conexión
!      " #       $
 % &         "           %
                     #
# $ #           #       '
#               #
(       %               "       #   #   '
    #       %
#               $
    #
#               #
(       %           "   #   #   '
    #       %
#               $
    #
%   %     $ ) *+ , *-    #
. /       %      )* ,* 0       #
!          % ) *+ , * 1   #
!   %%    ) *+ -2 , * 2     3.
4 %     ) *0 , *+       #

    #   "              # ")
5 %6 #          7(            /   )*    #
8       $   /        # *+ 9       $    )*   #
$

        #

        "

        !
                                                                &




                     %       $        #       "        !

:   $       $   %   5!   9       %&       $       "&   5!   $
# $ #           #       '
'                               (
(       %               "           #   #   '
    #       %
    #           $
    #
'                                     (
                             ";       <
    =>   ?
.        8&
             3       "            4
                 @
4            .           "
                                      7       "
)                                                  *+       ,
    8                    #                                              %
                         %                    #    $       /            #       $                #
&       %

                                  $                    /   ;                        $   /   " <
                         #            $#
!                   "                                                   #                    /
                    "        %            "        $           &

                /             #               0$                    %           $

:           ?           ? &           A
-. / 0

  => ?                       $       #       %
&   $                               =>
    # "#             %B          # % $       %
      &% %           #       /       %   $
  %   7 %        %       $

  %              %            $              &   $
             %           " => ?
)   / %
1 ((       2       (

      .      8&                      % #
           %%                %   #   C   #   %
$
            %
@            &
! &              &   "


                 %       "   "   "
3          4

                  "                           #
                      /                           %
           # #

    @D       %$       %$          /
         # #  /                %$ E       F
%           %$

    (        ,3 $     #    /
/ ( 3

                            %                                #
                        %                                    "
        %
G ,             %                   "       #        /
8           %       #           #       /   #       =>   ?

    (                                           )
4

                        #
      %   #           # $           "
!                      %          # C %
          %                       $
  ,       %
! &           &       "
.                 /       "        #

 3                            /
4           (       1

    E  F G >D #   # %     $                     &        $
  & " %         $        $                           %           %
%   #   # %$        % E $                           %F
! &                 &       "
@       #       #   "# %            &

    4           9$ "                    %   $   %            "
/             ) 33                        5

                   B                               %
         % #                       %

 #           & %
>        %             %   "           %
3    #       %%    /

 3       %                     &           $
# $ #       #   '
#           #
6
    #   %
#           $
    #
7
4                       %           %          @>
@        B                   9# &              %        "       9% &                9       &       %

.    %                      9 & %E                 "F
%%                           #      B                       %%              "           "

                  %     %                  $                        "
G                 /          #      .                       %           $               $

                             %      %          &
>    /       $&                                ;        &       %                               <


( %      #            & 9               # "#   &                                /
'
                      %8                      &          %
      #                    ;           "! <          %       %

H                 #       %
          #                            %      &%                       %           "
H >                   &            "
                                           % %
              "                        3             "
    ( %               &        9                 %               " 9       %   "
                  "        #
                             & ; >&-7 > &+7 (& <
                          " ; ! 9 ( , 2I9 " %   <
# $ #       #           '
#           #
(       %               "       #   #   '
                    8   97      3
#           $
    #
6                      8          9
.                               # "#   &

             $ %% %              # % &

#    3 %       "        %

         =      %

!%       9$ #                    %

         # %        #       /    % &       ),<
# $ #       #       '
    #           #
(       %           "       #   #   '
    #       %
'
    #
'
                    B        4 "         ;   47   4<

    J

                            ";       <

    =>      ?

>       /       /   %

            & %         "        "       #   $
# $ #           #       '
#               #
(       %               "       #   #   '
    #       %
#               $
                        3
3
8

#   /       "

    /       "

    :

K   "       /

                         ;                 <

@       7       &%       ;        K   "   5%     <

                     ?       /;                $ "<
1           :                33
)                              : ;+    <9             (
/ 1=; L0 ,+2L01L+21L


4 >>   ;1          4       &
/ 1=; L0 , - +11I++1


'                      *       ( 7 (         ,
/ 1=; L0 , 0-2I+LL+-


'          (   (                 '      ;/        (       (           4
/ 1=; L0 , - +- 1 I2


       7           33                            ;?           (           8
/ 1=; L0 , - +1 100


/3                                      ;'            )           3
/ 1=; L0 , 0-2I+ 1
33

            # /                    #   @>
5   %        9&   %   9&   %
        &
            "     /            #       :8
/                     '
    )       (               %

    = 9
        '       : ; +++++
        '       : ;
        '       : ; @@@@@

Más contenido relacionado

La actualidad más candente

Ben Rothke webcasts
Ben Rothke webcastsBen Rothke webcasts
Ben Rothke webcastsBen Rothke
 
Emily Dickinson Books
Emily Dickinson BooksEmily Dickinson Books
Emily Dickinson BooksB. Hamilton
 
2011 november flemington office calendar
2011 november   flemington office calendar2011 november   flemington office calendar
2011 november flemington office calendarWeichert, Realtors
 
025 kamala
025 kamala025 kamala
025 kamalaHari99
 
Price List
Price ListPrice List
Price Listeckolimo
 
CANAL+Régie - Présentation Gep
CANAL+Régie - Présentation GepCANAL+Régie - Présentation Gep
CANAL+Régie - Présentation Gepguest64a3a1c
 
AMI@Work, May 2005, Munich, Germany
AMI@Work, May 2005, Munich, GermanyAMI@Work, May 2005, Munich, Germany
AMI@Work, May 2005, Munich, GermanyIlkka Kakko
 
Tally reactivate license kalpataru
Tally reactivate license kalpataruTally reactivate license kalpataru
Tally reactivate license kalpataruSwati
 
Articles written By Ben Rothke
Articles written By Ben RothkeArticles written By Ben Rothke
Articles written By Ben RothkeBen Rothke
 
Primeras páginas nunca más
Primeras páginas  nunca másPrimeras páginas  nunca más
Primeras páginas nunca másmjgolo
 
Np modificacion lopd
Np modificacion lopdNp modificacion lopd
Np modificacion lopdmosobi
 
Kumpulan soal-cpns
Kumpulan soal-cpnsKumpulan soal-cpns
Kumpulan soal-cpnsAgus Gunawan
 
En know your_prophet
En know your_prophetEn know your_prophet
En know your_prophetLoveofpeople
 
COC - Guia paso a paso AFIP
COC - Guia paso a paso AFIPCOC - Guia paso a paso AFIP
COC - Guia paso a paso AFIPRosana Frachia
 

La actualidad más candente (20)

Ben Rothke webcasts
Ben Rothke webcastsBen Rothke webcasts
Ben Rothke webcasts
 
Emily Dickinson Books
Emily Dickinson BooksEmily Dickinson Books
Emily Dickinson Books
 
2011 november flemington office calendar
2011 november   flemington office calendar2011 november   flemington office calendar
2011 november flemington office calendar
 
025 kamala
025 kamala025 kamala
025 kamala
 
Carta medios mellizos
Carta medios mellizosCarta medios mellizos
Carta medios mellizos
 
Price List
Price ListPrice List
Price List
 
CANAL+Régie - Présentation Gep
CANAL+Régie - Présentation GepCANAL+Régie - Présentation Gep
CANAL+Régie - Présentation Gep
 
AMI@Work, May 2005, Munich, Germany
AMI@Work, May 2005, Munich, GermanyAMI@Work, May 2005, Munich, Germany
AMI@Work, May 2005, Munich, Germany
 
liposuction
liposuctionliposuction
liposuction
 
Tally reactivate license kalpataru
Tally reactivate license kalpataruTally reactivate license kalpataru
Tally reactivate license kalpataru
 
sentence structure revision
sentence structure revisionsentence structure revision
sentence structure revision
 
Articles written By Ben Rothke
Articles written By Ben RothkeArticles written By Ben Rothke
Articles written By Ben Rothke
 
Primeras páginas nunca más
Primeras páginas  nunca másPrimeras páginas  nunca más
Primeras páginas nunca más
 
Np modificacion lopd
Np modificacion lopdNp modificacion lopd
Np modificacion lopd
 
Kumpulan soal-cpns
Kumpulan soal-cpnsKumpulan soal-cpns
Kumpulan soal-cpns
 
Math fin
Math finMath fin
Math fin
 
Pecados capitales
Pecados capitalesPecados capitales
Pecados capitales
 
SEWA GUNA USAHA (LEASING)
SEWA GUNA USAHA (LEASING)SEWA GUNA USAHA (LEASING)
SEWA GUNA USAHA (LEASING)
 
En know your_prophet
En know your_prophetEn know your_prophet
En know your_prophet
 
COC - Guia paso a paso AFIP
COC - Guia paso a paso AFIPCOC - Guia paso a paso AFIP
COC - Guia paso a paso AFIP
 

Similar a Developing secure web applications

Zmeny legislativy pro NNO
Zmeny legislativy pro NNOZmeny legislativy pro NNO
Zmeny legislativy pro NNOInnovation Tank
 
Outsourcing ano ci ne ?
Outsourcing ano ci ne ?Outsourcing ano ci ne ?
Outsourcing ano ci ne ?Marek Blazek
 
Obiee beginner guide iii
Obiee beginner guide iiiObiee beginner guide iii
Obiee beginner guide iiiAmit Sharma
 
National Sales Executive, Toronto
National Sales Executive, TorontoNational Sales Executive, Toronto
National Sales Executive, TorontoLynnDoyle
 
National Sales Executive, Toronto
National Sales Executive, TorontoNational Sales Executive, Toronto
National Sales Executive, TorontoNancyMandrake
 
orofacial infections-in_children__pedo_HaiTrieu
orofacial infections-in_children__pedo_HaiTrieuorofacial infections-in_children__pedo_HaiTrieu
orofacial infections-in_children__pedo_HaiTrieuHai Trieu
 
Uu no 13 tahun 1985
Uu no 13 tahun 1985Uu no 13 tahun 1985
Uu no 13 tahun 1985khairu_zikri
 
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1เทวัญ ภูพานทอง
 
Menganalisa kerusakan laptop
Menganalisa kerusakan laptopMenganalisa kerusakan laptop
Menganalisa kerusakan laptopwardi Unigha
 
Tratado da verdadeira devoção à santíssima virgem
Tratado da verdadeira devoção à santíssima virgemTratado da verdadeira devoção à santíssima virgem
Tratado da verdadeira devoção à santíssima virgembabins
 
20110920「facebook基礎講座 中級編」セミナー資料
20110920「facebook基礎講座 中級編」セミナー資料20110920「facebook基礎講座 中級編」セミナー資料
20110920「facebook基礎講座 中級編」セミナー資料松崎 和弘
 
Introduction to Computer Music: Week one
Introduction to Computer Music: Week oneIntroduction to Computer Music: Week one
Introduction to Computer Music: Week oneDon Ankney
 
Japanese Lesson
Japanese LessonJapanese Lesson
Japanese Lessonguest68d8c
 
Geometry summer packet instructions
Geometry summer packet instructionsGeometry summer packet instructions
Geometry summer packet instructionscanalculus
 
Creatividad e innovación en las ideas empresariales
Creatividad e innovación en las ideas empresarialesCreatividad e innovación en las ideas empresariales
Creatividad e innovación en las ideas empresarialesAlberto Barbero
 
Stratégie et changement thérapeutique ; expérience en République Centrafricaine
Stratégie et changement thérapeutique ; expérience en République CentrafricaineStratégie et changement thérapeutique ; expérience en République Centrafricaine
Stratégie et changement thérapeutique ; expérience en République CentrafricaineInstitut Pasteur de Madagascar
 

Similar a Developing secure web applications (20)

My CV
My CVMy CV
My CV
 
Zmeny legislativy pro NNO
Zmeny legislativy pro NNOZmeny legislativy pro NNO
Zmeny legislativy pro NNO
 
Outsourcing ano ci ne ?
Outsourcing ano ci ne ?Outsourcing ano ci ne ?
Outsourcing ano ci ne ?
 
Obiee beginner guide iii
Obiee beginner guide iiiObiee beginner guide iii
Obiee beginner guide iii
 
National Sales Executive, Toronto
National Sales Executive, TorontoNational Sales Executive, Toronto
National Sales Executive, Toronto
 
National Sales Executive, Toronto
National Sales Executive, TorontoNational Sales Executive, Toronto
National Sales Executive, Toronto
 
Web Services
Web ServicesWeb Services
Web Services
 
orofacial infections-in_children__pedo_HaiTrieu
orofacial infections-in_children__pedo_HaiTrieuorofacial infections-in_children__pedo_HaiTrieu
orofacial infections-in_children__pedo_HaiTrieu
 
Uu no 13 tahun 1985
Uu no 13 tahun 1985Uu no 13 tahun 1985
Uu no 13 tahun 1985
 
Slide
SlideSlide
Slide
 
Slide
SlideSlide
Slide
 
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1
ผลการเรียนวิชาคอมพิวเตอร์ ชั้น ม.4/1
 
Menganalisa kerusakan laptop
Menganalisa kerusakan laptopMenganalisa kerusakan laptop
Menganalisa kerusakan laptop
 
Tratado da verdadeira devoção à santíssima virgem
Tratado da verdadeira devoção à santíssima virgemTratado da verdadeira devoção à santíssima virgem
Tratado da verdadeira devoção à santíssima virgem
 
20110920「facebook基礎講座 中級編」セミナー資料
20110920「facebook基礎講座 中級編」セミナー資料20110920「facebook基礎講座 中級編」セミナー資料
20110920「facebook基礎講座 中級編」セミナー資料
 
Introduction to Computer Music: Week one
Introduction to Computer Music: Week oneIntroduction to Computer Music: Week one
Introduction to Computer Music: Week one
 
Japanese Lesson
Japanese LessonJapanese Lesson
Japanese Lesson
 
Geometry summer packet instructions
Geometry summer packet instructionsGeometry summer packet instructions
Geometry summer packet instructions
 
Creatividad e innovación en las ideas empresariales
Creatividad e innovación en las ideas empresarialesCreatividad e innovación en las ideas empresariales
Creatividad e innovación en las ideas empresariales
 
Stratégie et changement thérapeutique ; expérience en République Centrafricaine
Stratégie et changement thérapeutique ; expérience en République CentrafricaineStratégie et changement thérapeutique ; expérience en République Centrafricaine
Stratégie et changement thérapeutique ; expérience en République Centrafricaine
 

Más de Security Ninja

The Realex Payments Application Story
The Realex Payments Application StoryThe Realex Payments Application Story
The Realex Payments Application StorySecurity Ninja
 
Owasp App Sec Ireland Windows Phone 7 Security
Owasp App Sec Ireland Windows Phone 7 SecurityOwasp App Sec Ireland Windows Phone 7 Security
Owasp App Sec Ireland Windows Phone 7 SecuritySecurity Ninja
 
SecurityBSides London - windows phone 7
SecurityBSides London - windows phone 7SecurityBSides London - windows phone 7
SecurityBSides London - windows phone 7Security Ninja
 
OWASP Birmingham - Mobile Application Security
OWASP Birmingham - Mobile Application SecurityOWASP Birmingham - Mobile Application Security
OWASP Birmingham - Mobile Application SecuritySecurity Ninja
 
BruCON Agnitio Workshop
BruCON Agnitio WorkshopBruCON Agnitio Workshop
BruCON Agnitio WorkshopSecurity Ninja
 
SecurityBSides las vegas - Agnitio
SecurityBSides las vegas - AgnitioSecurityBSides las vegas - Agnitio
SecurityBSides las vegas - AgnitioSecurity Ninja
 
Hack in Paris - Agnitio
Hack in Paris - AgnitioHack in Paris - Agnitio
Hack in Paris - AgnitioSecurity Ninja
 
SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...Security Ninja
 
SecurityBSides London - Agnitio: it's static analysis but not as we know it
SecurityBSides London - Agnitio: it's static analysis but not as we know itSecurityBSides London - Agnitio: it's static analysis but not as we know it
SecurityBSides London - Agnitio: it's static analysis but not as we know itSecurity Ninja
 
The Principles of Secure Development - Epicenter Dublin
The Principles of Secure Development - Epicenter DublinThe Principles of Secure Development - Epicenter Dublin
The Principles of Secure Development - Epicenter DublinSecurity Ninja
 
Application security and PCI DSS
Application security and PCI DSSApplication security and PCI DSS
Application security and PCI DSSSecurity Ninja
 
The Security Risks of Web 2.0 - DEF CON 17
The Security Risks of Web 2.0 - DEF CON 17The Security Risks of Web 2.0 - DEF CON 17
The Security Risks of Web 2.0 - DEF CON 17Security Ninja
 
Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Security Ninja
 
Injecting simplicity not SQL BSides Las Vegas 2010
Injecting simplicity not SQL BSides Las Vegas 2010Injecting simplicity not SQL BSides Las Vegas 2010
Injecting simplicity not SQL BSides Las Vegas 2010Security Ninja
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009Security Ninja
 
The Principles of Secure Development
The Principles of Secure DevelopmentThe Principles of Secure Development
The Principles of Secure DevelopmentSecurity Ninja
 
Owasp talk-november-08
Owasp talk-november-08Owasp talk-november-08
Owasp talk-november-08Security Ninja
 

Más de Security Ninja (18)

Hack in Paris 2013
Hack in Paris 2013Hack in Paris 2013
Hack in Paris 2013
 
The Realex Payments Application Story
The Realex Payments Application StoryThe Realex Payments Application Story
The Realex Payments Application Story
 
Owasp App Sec Ireland Windows Phone 7 Security
Owasp App Sec Ireland Windows Phone 7 SecurityOwasp App Sec Ireland Windows Phone 7 Security
Owasp App Sec Ireland Windows Phone 7 Security
 
SecurityBSides London - windows phone 7
SecurityBSides London - windows phone 7SecurityBSides London - windows phone 7
SecurityBSides London - windows phone 7
 
OWASP Birmingham - Mobile Application Security
OWASP Birmingham - Mobile Application SecurityOWASP Birmingham - Mobile Application Security
OWASP Birmingham - Mobile Application Security
 
BruCON Agnitio Workshop
BruCON Agnitio WorkshopBruCON Agnitio Workshop
BruCON Agnitio Workshop
 
SecurityBSides las vegas - Agnitio
SecurityBSides las vegas - AgnitioSecurityBSides las vegas - Agnitio
SecurityBSides las vegas - Agnitio
 
Hack in Paris - Agnitio
Hack in Paris - AgnitioHack in Paris - Agnitio
Hack in Paris - Agnitio
 
SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...SecurityBSides London - Jedi mind tricks for building application security pr...
SecurityBSides London - Jedi mind tricks for building application security pr...
 
SecurityBSides London - Agnitio: it's static analysis but not as we know it
SecurityBSides London - Agnitio: it's static analysis but not as we know itSecurityBSides London - Agnitio: it's static analysis but not as we know it
SecurityBSides London - Agnitio: it's static analysis but not as we know it
 
The Principles of Secure Development - Epicenter Dublin
The Principles of Secure Development - Epicenter DublinThe Principles of Secure Development - Epicenter Dublin
The Principles of Secure Development - Epicenter Dublin
 
Application security and PCI DSS
Application security and PCI DSSApplication security and PCI DSS
Application security and PCI DSS
 
The Security Risks of Web 2.0 - DEF CON 17
The Security Risks of Web 2.0 - DEF CON 17The Security Risks of Web 2.0 - DEF CON 17
The Security Risks of Web 2.0 - DEF CON 17
 
Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010Injecting simplicity not SQL RSA Europe 2010
Injecting simplicity not SQL RSA Europe 2010
 
Injecting simplicity not SQL BSides Las Vegas 2010
Injecting simplicity not SQL BSides Las Vegas 2010Injecting simplicity not SQL BSides Las Vegas 2010
Injecting simplicity not SQL BSides Las Vegas 2010
 
The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009The Principles of Secure Development - BSides Las Vegas 2009
The Principles of Secure Development - BSides Las Vegas 2009
 
The Principles of Secure Development
The Principles of Secure DevelopmentThe Principles of Secure Development
The Principles of Secure Development
 
Owasp talk-november-08
Owasp talk-november-08Owasp talk-november-08
Owasp talk-november-08
 

Developing secure web applications

  • 1.
  • 2. ! " # $ % & " % #
  • 3. # $ # # ' # # ( % " # # ' # % # $ #
  • 4. # # ( % " # # ' # % # $ #
  • 5.
  • 6. % % $ ) *+ , *- # . / % )* ,* 0 # ! % ) *+ , * 1 # ! %% ) *+ -2 , * 2 3. 4 % ) *0 , *+ # # " # ") 5 %6 # 7( / )* # 8 $ / # *+ 9 $ )* #
  • 7. $ # " ! & % $ # " ! : $ $ % 5! 9 %& $ "& 5! $
  • 8. # $ # # ' ' ( ( % " # # ' # % # $ #
  • 9. ' ( "; < => ? . 8& 3 " 4 @ 4 . " 7 "
  • 10. ) *+ , 8 # % % # $ / # $ # & % $ / ; $ / " < # $# ! " # / " % " $ & / # 0$ % $ : ? ? & A
  • 11.
  • 12. -. / 0 => ? $ # % & $ => # "# %B # % $ % &% % # / % $ % 7 % % $ % % $ & $ % " => ?
  • 13. ) / %
  • 14. 1 (( 2 ( . 8& % # %% % # C # % $ % @ & ! & & " % " " "
  • 15. 3 4 " # / % # # @D %$ %$ / # # / %$ E F % %$ ( ,3 $ # /
  • 16. / ( 3 % # % " % G , % " # / 8 % # # / # => ? ( )
  • 17. 4 # % # # $ " ! % # C % % $ , % ! & & " . / " # 3 /
  • 18. 4 ( 1 E F G >D # # % $ & $ & " % $ $ % % % # # %$ % E $ %F ! & & " @ # # "# % & 4 9$ " % $ % "
  • 19. / ) 33 5 B % % # % # & % > % % " % 3 # %% / 3 % & $
  • 20. # $ # # ' # # 6 # % # $ #
  • 21. 7 4 % % @> @ B 9# & % " 9% & 9 & % . % 9 & %E "F %% # B %% " " % % $ " G / # . % $ $ % % & > / $& ; & % < ( % # & 9 # "# & /
  • 22. ' %8 & % # ; "! < % % H # % # % &% % " H > & " % % " 3 " ( % & 9 % " 9 % " " # & ; >&-7 > &+7 (& < " ; ! 9 ( , 2I9 " % <
  • 23. # $ # # ' # # ( % " # # ' 8 97 3 # $ #
  • 24. 6 8 9 . # "# & $ %% % # % & # 3 % " % = % !% 9$ # % # % # / % & ),<
  • 25. # $ # # ' # # ( % " # # ' # % ' #
  • 26. ' B 4 " ; 47 4< J "; < => ? > / / % & % " " # $
  • 27. # $ # # ' # # ( % " # # ' # % # $ 3
  • 28. 3 8 # / " / " : K " / ; < @ 7 &% ; K " 5% < ? /; $ "<
  • 29. 1 : 33 ) : ;+ <9 ( / 1=; L0 ,+2L01L+21L 4 >> ;1 4 & / 1=; L0 , - +11I++1 ' * ( 7 ( , / 1=; L0 , 0-2I+LL+- ' ( ( ' ;/ ( ( 4 / 1=; L0 , - +- 1 I2 7 33 ;? ( 8 / 1=; L0 , - +1 100 /3 ;' ) 3 / 1=; L0 , 0-2I+ 1
  • 30. 33 # / # @> 5 % 9& % 9& % & " / # :8
  • 31.
  • 32. / ' ) ( % = 9 ' : ; +++++ ' : ; ' : ; @@@@@