ࡱ> ; R5!bjbjȝȝshh5~ ~ ..... ^:OOO# % % % % % % $:#%@I !O-"OOOI j O.O# }u 0 0&S0&80&tOOOOOOOI I 5OOO OOOO0&OOOOOOOOO~ b : -NWS"~?el'Yf[ zYef['Y~ Course Syllabus of Zhongnan University of Economics and Law Course Title: Network and Information securityCourse Code41143020SemesterautumnTeaching Hours32Credits2Prerequisitesmathematics, computer networkInstructor InformationNameAiju ZhangEmail2002zaj@163.comInstituteSchool of Information and Security EngineeringApplicable ObjectInternational StudentsCourse ObjectivesMaster the concepts, theories and algorithms related to network and information security. The main objectives are as follows: 1. Understand the main problems and elements of network information security; 2.Master the basic concepts related to cryptography, the development history of cryptography, the classification of cryptographic algorithms, the main transformation methods in symmetric cryptographic algorithms, the encryption and decryption characteristics of public key cryptographic algorithms, and the main problems to be solved; 3. Master common message authentication and identity authentication methods, such as Mac message authentication, Hash function and several common digital signature algorithms; 4. Master the concept of digital certificate, the composition and working principle of PKI system. Key points: X.509 digital certificate format, PKI system composition, verification process of digital certificate chain; 5. Understand and master the main security functions, implementation principles and types of firewalls. Key points: master the working principles, advantages and disadvantages of packet filtering, circuit gateway and application gateway; 6. Understand and master IDS principles and methods, IDS structure, NIDS, HIDS, DIDS, IDS design considerations and deployment, and IDS development trends. Basic requirements: understand the main security functions, implementation principles and types of IDS. Key points: master the design ideas, key technologies, advantages and disadvantages of NIDS, HIDS and DIDS; 7. Understand and master the basic principles of computer viruses, the types of computer viruses and the prevention of computer viruses.Course Description (200 words)This course is an elective course for computer science and technology and information security majors, which is closely integrated with theory and practice. It systematically introduces various aspects of network and information security, mainly including: network information security overview, computer cryptography (including symmetric cryptography, asymmetric cryptography, message authentication and identity authentication, one-way hash function, etc.), PKI technology and digital certificates, Firewall technology, intrusion detection technology, computer viruses and prevention technology. Through the study of this course, students can understand the various security threats faced by the network and information system, improve their security awareness, master the basic concepts, algorithms and technologies related to network security, and be able to practice the basic skills of information security in the network environment, laying a necessary foundation for engaging in relevant jobs after graduation. Assessment Methods Study report and experiment report Textbooks and References 1. lecture1428550736-CRYPTOGRAPHY AND NETWORK.pdf 2. fips-197.pdf 3.  HYPERLINK "https://www.slideserve.com/" Upload and Share Documents Presentations Online - SlideServe 4.  HYPERLINK "https://ieeexplore.ieee.org/Xplore/home.jsp" https://ieeexplore.ieee.org/Xplore/home.jsp 5.  HYPERLINK "https://sci-hub.se" https://sci-hub.se 6.https://sci-hub.st 7.https://sci-hub.ru Course planningChapter 1 The concept of network and information security Topic1:what is network security? Topic2:the history of network security Topic3:why need network security? Topic4:Types of Attacks Topic5:Network level security requirements Topic6: Network and information security measures Chapter 2 Symmetric encryption algorithm Topic1:The Origin and Development of Cryptography Topic2:Basic Concepts of cryptography Topic3:Mathematical Basis of Cryptography Topic4:Classical Encryption Techniques Topic5:SUBSTITUTION Techniques Topic6:Transposition Techniques Topic7:DES Topic8:AES Chapter 3Topic1: basic thought of public-key cryptography Topic2: One-way trapdoor function Topic3: the Mathematical Problem of Public Key Cryptography Topic4: Common Public Key Cryptographic Algorithms Topic5:Diffie Hellman Key Exchange Algorithm Topic6: RSA public key algorithm Topic7: Application fields of public key cryptography Topic8: Comparison between public key cryptography and private key cryptography Chapter 4 Message Authentication and Digital SignatureTopic1: Direct digital signature Topic2: MAC message authentication code Topic3: Message authentication mechanism Topic4: Message authentication method Topic5: Digital Digest Topic6: Principle of Digital Signature Topic7: RSA Digital Signature Topic8: DSS Digital Signature Chapter 5 Digital certificate and public key facilitiesTopic1: basic concept of PKI Topic2: concept/structure/generation/verification/revocation of digital certificate Topic3: concept of digital certificate Topic4: X.509 digital certificate format Topic5: verification process of digital certificate chain Topic6: Security provided by PKI/CA Chapter6 Firewall technologyTopic1: firewall concept Topic2: firewall type: static packet filtering firewall, dynamic packet filtering firewall, circuit level gateway, application level gateway, state detection firewall, distributed firewall Topic3: working principles of firewall Topic4: advantages and disadvantages of firewall Topic5: Deployment strategy of firewall Chapter7 Intrusion Detection TechnologyTopic1: IDS overview Topic2: IDS principle and method Topic3:IDS structure, NIDS, HIDS, DIDS Topic4: IDS design considerations and deployment Topic5: Advantages and disadvantages of NIDS, HIDS and DIDS Topic6: The basic principles and methods of anomaly detection and misuse detection Chapter8Topic1: Computer virus and virus prevention Topic2: Overview of computer viruses Topic3: Basic principles of computer viruses Topic4: Prevention of computer viruses   ,.>DFVl  " $ 4 6 B D F X Z b d f h õǞvppǞj`Wh{15\aJh{15\aJo( 5aJo( 5\aJh h 5\aJh25KH\aJo(h2h20J5CJ\aJ5B*KHaJphB*KH\aJo(phh{15B*KHaJphh{15B*KHaJo(ph5CJ\aJo(5CJOJPJQJ^JaJo(%j5B*CJOJQJUaJph! F $ 6 tk]k $$1$Ifa$gd2 $$Ifa$jkd$$IfT7(9)0644 lap T$IfKWD,`K WD` $WDX`a$ 6 D F d j z ~ D;; $$Ifa$kd$$IfT7\ w(d  V 0644 lap(T $$Ifa$h j x z | ~           * + , 5 6 d e f q r w x   ! 秞璒hkhitaJo(hk5CJ\hkhit5CJ\h *S5aJo(h *S5B*KHaJph5B*aJo(ph+++5B*aJph+++h{15\aJ5B*KHaJo(phh{15\aJo( 5aJo(5B*KHaJph 5\aJo(1~ MD; $$Ifa$ $$Ifa$kdR$$IfT7\ w(d  V 0644 lap(T  }o $dh$1$Ifa$kd$$IfT70 (d 0644 lapT    + $$Ifa$ $$Ifa$jkd$$IfT7(9)0644 lap T+ , 6 e MD; $$Ifa$ $$Ifa$kdA$$IfT7\ w(d  V 0644 lap(Te f x }tk $$Ifa$ $$Ifa$kd$$IfT70 (d 0644 lapT n m I70}tnnnnnnnn$If $$Ifa$kd$$IfT70 (d 0644 lapT ! " # l m n p  p  k l m n o p y GIJKL}56789:./017ǾǾط 5B*CJOJQJ^JaJph 5\aJo( h"<aJo(hhaJh haJ haJo(hkhkaJhk hkaJo( h aJ hkaJ hkaJhkh aJo(hkh aJhkhitaJ001DPKLMzqqb\\$If$IfWD`gd:J dP$IfkdH$$IfT0 (d 0644 lapyt"<T79CDOPJKLMNTUYZ`abcdeyph 5\aJh 5\aJo(5B*KHaJphh6Dh6D5\aJ5B*KHaJo(ph5B*aJo(ph5B*aJph 5\aJo( h:JCJo(h:Jh:JCJ5B*CJaJo(ph 5B*CJOJQJ^JaJph#5B*CJOJQJ^JaJo(ph,MNabcde}tnnnnnnnnn$If $$Ifa$kd$$IfT70 (d 0644 lapT W%}tnnnnnnnnnn$If $$Ifa$kd$$IfT70 (d 0644 lapT UVWXYZ[\fgȾȲ׮woh+hB*phh+h5\aJh+h0J5B*\aJphh+h5B*\aJph"jh+h5B*U\aJphh+hh 0JB*CJphh B*CJphjh B*CJUphh 5\aJh 5\aJo( 5\aJh h 5\aJh +$%&'()*9:;?@DEȼȳ}rfrL3hh5B*CJ`KHOJPJQJ\aJ`ph5B*KHaJo(ph5B*KHaJph5B*aJo(phh5\aJo(h5\aJ 5\aJ 5\aJo(hOhO5\aJhO5\aJh+hh+h5\aJh+h5\aJh+h0J5B*\aJph"jh+h5B*U\aJphh+h5B*\aJph%&'()*:wn $$Ifa$kd%$$IfT70 (d 0644 lapT$If:;uv#UVzzzzzzz$If $$Ifa$ $$Ifa$gdjkd$$IfT7(9)0644 lap T Etuv}"#%*+2ǺǢnj|o|||occSSh0h9 5B*\aJphh9 5B*aJphh05B*\aJphh0h05B*\aJphh05B*aJo(ph5B*aJphh05B*aJphh5B*aJphh5B*aJo(ph5B*aJo(phh5B*KHaJo(phhh5B*aJphhh5B*\aJph2CTUVW[\aȿyyl_OBh%15B*aJo(phh Ymh Ym5B*\aJphh Ym5B*\aJphhy}5B*\aJphhy}hy}5B*\aJphh%1h%15B*aJphh%1h%15B*\aJph5B*KHaJo(ph5B*KHaJph5B*aJph5B*aJo(phh9 h9 5B*aJo(phh9 h9 5B*\aJphh9 5B*\aJphVW*Iiu}qhbbbYYYY $Ifgd%1$If $$Ifa$ $$Ifa$gd%1kdG$$IfT70 (z 0644 lapT   )*/01>HIJNOPhinoptuz{|ظ؜؏znzn5B*KHaJo(ph5B*KHaJph5B*aJo(phhI 5B*aJo(phhI 5B*aJphhL\hL\5B*\aJphh\.h\.5B*\aJphhAhA5B*\aJphh%15B*aJo(phhh5B*aJphh%15B*aJph&uN{kbYYYYYY $Ifgde$ $$Ifa$kd$$IfT70 (z 0644 lapT $IfgdI $Ifgd%1  !"#MNSTU³£xk__hTW5B*aJphhTW5B*aJo(phh|8h|85B*aJphh|8h)5B*aJphh45B*aJphhTWhe$5B*aJphh4h45B*aJphh4hI 5B*aJo(phhI 5B*aJphhI hI 5B*aJphhI he$5B*aJo(ph!Uz{!"#$,-.AZ[bǸˬǸ˜xlhWWl h\h\5B*KHaJphh\5B*KHaJo(ph5B*KHaJph5B*aJo(phh$,h$,5B*aJphh$,h|85B*aJphhe$5B*aJphh|8h|85B*aJphh|8he$5B*aJo(phhTW5B*aJo(phhTW5B*aJphhTWhTW5B*aJph!"#$[| 1kb $$Ifa$kd $$IfT70 (z 0644 lapT $Ifgd$, $Ifgde$ bc{|   016789NOTUVWlmnowxyʿԯhuhu5B*aJph huhu5B*KHaJphhu5B*KHaJo(ph5B*KHaJph5B*aJo(phhe$5B*aJo(phhe$5B*aJphh9N;h9N;5B*aJphh9N;81Omno?hkb $$Ifa$kd $$IfT70 (z 0644 lapT $Ifgd9N; $Ifgde$  >?DEFGHIghmnopĵĵo hzhz5B*KHaJphhz5B*KHaJphhe$5B*KHaJphhe$5B*KHaJo(ph5B*aJo(phhzhz5B*aJphhzhu5B*aJphhuhu5B*aJphhuhe$5B*aJo(phhe$5B*aJph(;<tkbbbbbb $Ifgde$ $$Ifa$kd $$IfT70 (z 0644 lapT $Ifgdz   :;<=>DEFսսս蹪ɠuh 5B*KHaJphhe$5B*KHaJphhe$5B*KHaJo(ph5B*aJo(phh h 5B*aJphh h|55B*aJphhe$5B*aJphh|5h|55B*aJphh|5he$5B*aJo(ph5B*KHaJph+<=ez/ }tkkkkkkk $Ifgde$ $$Ifa$kdX $$IfT70 (z 0644 lapT Fdelmyz . / 0 4 5 6 7 8 I ̽нббТбОбssh0h05B*aJphh05B*aJphh0h}5B*aJphh}h}h}5B*aJphhe$5B*aJphh-8h-85B*aJphh-8he$5B*aJo(ph#he$he$B*KH\aJo(ph h h 5B*KHaJph( !2!3!}tkkkkk $Ifgde$ $$Ifa$kd $$IfT70 (z 0644 lapT ! ! !!!!!1!2!3!4!5!¶ղննղ՗hU95CJ\aJo(h-h-5B*aJphh-he$5B*aJphhMP;hMP;5B*aJphhMP;he$5B*aJo(phhe$5B*KHaJphhe$5B*KHaJo(ph3!4!5!}uKWD,`Kkd $$IfT70 (z 0644 lapT0182P. A!7"7#$%S n9_=\1rsn;II*]?@$ BaPd6DbQ8V-FcQv=HdR9$M'd]/LfS9m7Ndr}?PhT:%GO)e6OTjU8u*WVkUvVXlV;%g-eoLW0m:LMi4ApPxxBhd\. ݴZ8I^j9h9結#z";&ǠU-ju=$@h3gA# |<^Osl ہdI @P*HDA_f`0& H 8,9^l[ ̋x2;4 4d@lQfr("(8PFQ HEfk0b% A@" $ˈk.G|AZr#XbPS0$&qr)xٶTT,N* /˱|PDZD@=P&b"Z DUK@>!p!a&;Vgy{Q  YXUIVYJ"} q?!d!#DlA7(.MԂ2p w٨u9Xİ ٗIF\WXz$#8@o, (De1NSl u6mHZ p.OEQ!An$@,(?@$ BaPd6DbQ8V,i5+ZwT-8*HU.K(T + `5 B'SXY%PhT:l6t;By<"B:`ah;%gB`OMoYjs*% b !l$eB`L(EG  m |]?Q*=z* #hekf\>%ryPi9Źa@z$$K%?zs*I`tO)B,-(XPH4 D11hYt5K<ƹ5 Er`:N H<~QtW|LD=C{"0AebdP HeaHa]\p܋8! X=L@OճAfgmsrN ͂32C%**{Xʘ8FDӹLcn(:0xWSDVb93•(ZJ AҮ~G< $;AN.h5|ba< B`3 LOa g± Q@B05 B1ǖy^eh `F?(A6M kQp ca\jJ '2 0xw>G „1y+[Muhij1!~@j8^) v#~7/u_6Ĩ Pz#Pi0p,*0AEPm a89ȊN @a }猠F*ge V.~}4*#`kb19v.w)|oQ' J8zd A7e8uH0EdՕ* 1,YrBD#~C> <xA T#RjS H_ͩ71}AK 8MA@"W8zCX a$$PX Ah샄j;X녧 ~ΩZch7-(tȄ0H*CE|@h` zEYa@M T+qb "0ACrA\,c7)Җ5R y&죢ǩ&  Ul@` !{-Q7pa Rtλ:Y굧!ZixyQ^,EPZwEa3 \/a"JX6͙p?@$ BaPd6Dao0昔p6AXv8MJeRB AY T:?!L沸Qxq8!3ЪV+B&pa|PvQV;%E"_oh1`{5w@~dHB 1HW~OA2BFa].5ptU*+v<>$,`T8\.*y:U^V zvoS̬WRAE"],S3YY:|`I%Bp6yAN5mj׾H)l "Њ!b0 Ë)VU$,c д (sŊ3qx^D! ^ k. ~_ # KDL'Cd1C/`f/*$Hi&R24Q Կar.iYn Ub p;D_H$6d1XP K<ԥ\Dw"tWc8ȳ\%U"1Y0(lj{@ (Mbv۲K)TUH)\V$}4=XСB~ ABQV"(- n$j1d`hp) G&=Rދ30(P0c.ջܨ!r\ X5ZB Ke)K>NcFRS ^c0bPH.lNDZUb!]v&0$@'auXtZyg2M+y"P|b@N" &ofZ`(j `.ę$I>c$4B #!$O¿q_zT\Dp2"~8e<P-?"xBZrP&!/RVD$3`JE`K`dJ "@'t P P|Pe<_KpXO!(wqPA[`]TW' ȈS~2H(c 3b ~pjQ1F,R 8O!>H!"Xl a+aEكA:poD -dB Q(%@2i5xP4 I@a b+2qט d-b#b!:#Bf r.HC/H;pI9gAiAK+FT7F!1U ;.5 Xk(wQAD90R= 4=[y>PK@"R23a@u0IMD d~7TTx> Kix?(}F+ |NdYOhtzP]B=_QA):hq-)~31rB@Q! ~$F@D*%d3ldPz c)4F+h"!Iqz]?E% طO"Bl8pT X='B?̼BCA"м)$"JQ`+zzkZyŸ b`$FUyN@"E -$G ~0_JDfĘ:~>$eZX4np69G9::O u -0$ !v.-$%t$xB<A8!4Ih˙:@L/2sjb]zu1EE뙜3Սӯ6w9rheCG9ڰBlZ! Z;$D{9Кt',,z|ĐJK1TU((%z4C) vC∤Py QBʿR|`CȄĄ *, ±[(1MS`cdf,=i%dh086ݸH' T&y.L**caZ_n[Vì#*)`Z$`7Ršf1` )u܅BJsǒ <#˹#a4&lӝgY* ˝uecs؞(|I2\(pej \LeFoA0KA@P Ni{H&^X _Łǡ|i=soҾr1kPW pEm̹s4pgPchb] uȓqx2% d{yh!v] (  R~1@q CtmQtO3< VRiB2`  S<k"l}RS[BB5@ghWfl r<(aG ɻ{Sʁ;D 0!9' -ųG%$AѴe11R7|ql q8yc>^ !y}FB ^aʏ7`4獑l > I77]ytR }-f2I8B$&J" tvHV㜃JvX<P֡ER;b|`}L(gu(%@@?@$ BaPAUL FcQv0w;,4ǥRd]/C i~4gSY}=B$(tyl LnyQ&T7T*B Uj8eΧe|3Vk`iW   Q?cDZq} #!oӴ|p1j:%WC;7>dȿ!5n^.@@.,;Ktlׇ1R(!C8,;(5$p6XԮU*>K !?10ZAЊjx'(d$ i:z0o# ĕ%H k?d|<C-0Q% ,JP`F& }8\,7/l#Hr+5S! %܂B2`al¬S A@!Q(1IV(g)clkDY:Mj7&YXiUH&IE)HR! $Qb=GCj^Zḧ۾i[5DUo It\0 d2c՛2rH CX/ `t Q{BHNՌ-ڳQ Sw"8 X\Ev0&@(({gdaΥDǔp&K\ #k.F\&D7p [H9FQD(J(фbEvd뮶bBv%# % @n@$¨+y!ndiYv]3}q? o= "(MgBP ~arK@tP @ށC,pHdA;TfkD 5^ղQ(@DCM A!r/f>r#ʶ d@>L#[N Q~rLY+QA˜:GP ]beάb~k Ia&$ CW:Cg&A*s|lPBo!I|S>"OAY @A<2,r0F#x™\{tWj(La3 6\҈SI/U & $7C6/;ňejBCYQ]>>$y? 3@g d%P$Hɉ-07@}n!>GH r{ณDċAf*a/[H ¥d-,@}%H/B읓uGSJ5QB@^&|5T'2 JMi{uܜA'"y + Au0T9V݌1ز+p.M14$z_#5W2A5|Wk?*% @,XhMBͧh/Y#ę`-tr.˵qC$ $|zqjircf`F ׂ yaOuQ.:E"c.lpDl:E%X&HajdP_*'a{Y½ ^plI~ YVU 8"~˴)cl-=~n$v `QZV )6Q.e[r,$<+![K6M(H [ݵ{MӜ|qr\kDp\,(&C?!8kz^ ^-"ݴNIZ!p[}c.Zi"H$ԷΡҗ@2^[9Hx^IpaJ(0^hOgzOYz'p7BdL0N I?y4#xOgP~ LkDjSS Oaq'2h8C~qL 6q^zz/eqT?0BD֔=mJ%xa”R&ǣg?B$ ?=b*?@$ )x+~iDbQ8V-Ncqb BbM'JeRd\PO^/lm7Ja }?DSJH-&S(O¡Iܲԡ3> F&jta'j^oQp<$MΧ3Yp %Uy3$S0l6W^-u= tYYM s.'>aTSL)[- LP( Jsc^S³}[rs\ e H BP0~uGQ AF#G::X.+H05qj$:+ABƨA`X 2 < !tI]"Ihf1IX) vʼn`0xC_5𼂞g""XHDn! @`^DJ# 9lZ`P>/R"$;頱$]QIyIr\?}d@ul䁃 j$ S33ɢ7- H*L煵Mh:1#-h.N;Ci[߈!sVK~5`Uߪ4 1J./10M)A+đ83 pDJ!ANSydaziB Vuֺ.RtPX@["@ya,c{Na1$k11U0 񽫲2 ܅}rUn0&!b0I+ĆML",`CRR&*Fs?; 䂃b DjDOܭ%tQzRXW4y[ g8uozE$J%[&vŘRI%9p0U -VY{u mh[#y1Bha&( @ !(>)2~p,;B鹺nU)Aj6pB0>?ꈡx4H|eΌx ظ0~:ۮHHR:e cl. F+ x4QJ6t,,+-. IP.*'i{O(ާLc@daZ9`Qhфa] r([h'Q+(}EV.DZPèg"peñheg(>͞űEf@|LzB`NuѤEZ>v^%h~UہqaEV& wMd^8" zXa8N $$ $D0 2ff BY8{cETX#7fzvztj`dږ= .c߰)<A`W)YypOhY@`.łG|4<֌3Ʀ#YinYء/RwZ=_gq:ygֿH!p[hYwj1@P %ݝ"7wt>)p*`6Ʃt |^I* h8"'EOn0 2Xa:@` АQ]QiPG dT\ "@ ,[ $(eśs`.N8`^  O98C{rAC2ʠ!4X "Ce !1ȪXK$gH߫pX;a0:?@$ z=$jx_xV-FcQM'Jb"{JS9m7Ne)$}?ǤI3R)$v I"D (HdtzX%eWKep3$l1@kUgXB)4}pUX?Z+E]` EHEʥed,]M˨hVb,c蕹UZ8'#˿kzQrV* gKNje)h4qPsɸr0~n[ `H>ɻA**GaAsPS OCs#OL?ɂ`a4BAn|g9މ8 MGL H ^ H D!&9y "J @I\V L8%*$~n$v9dY SbT“,A=-1" Byr#d GB0If!\Wc@ c11LkK#U=PЕZpP \؉],xM|UIJv=p"~OqC0MGm[vdWCR@M\ QE#@ut"hS2 ɭ[$Xd2sLj-mu%6ZLOQDQ^v?=WJو&V8+tiHdX p[Ft a^`:N ɮE2fv_@4fU", #Ab pWdp^.B0 %Ip0*8+f55'$9ϙQ1x]f~d #R۞\5ƹtiN a: eu5`%BGb cp7֫"4!+T@[9d8w/@!. z:쟹`, Qh$]ABR A<c&e0d$" (BV sE@ `` 0ԛ w87am"OtA,Ȝ'!4r0, $pMRpF5:FM9 u A=H!`]apT6^4Ƙy;PWBT q" > >X T o#vq0@ΕCo+(KX_lyG84%58`pAȐ"DY!= 3^  8\%$?@$ B &%K}D" C~:6 /B4m6FNG3\@KtH$ ei|}?i@RiTJreʤAKkU4lPuR3PZT^>Eewϧm(bLkza@{Q)(Ptfh@"Dڱv5O4FL]b `HqʵcE*cr]8*Q(Q J_`4M#1˒zi4IyNS/?P`YJX.)xð% !J,Nh 3@%tJDQ! jI3ٶu:D"c)2~w!%x3`"$0'Pg;П4M"LJR3J@o7nFIb8Ƞk"pӁM F7MzL>0NM?<(MTUJ$24U!پ>a["C [ 0E[%(!v>ZŰ)k!lSaA T8\@$1y->MR<iJ!2 C#AT`H)Vuq87D5J:os\ ~d=Fbyw "@ 62bhOZ';9P .lbD H?2>ݚ,n|epA4% h-p# @Dщ#`YK-$AQ Ô9DM\/ t.aAElÑ6&%T;C=QB(HAӨ 6-xp"UE0FH1$DR,a2\AH4= d)r f8"hM3Dh3!ZP ^HA7@rڌ+hIFdəS.fx tXf_ Uatl Cf ^ `t}"±< 2~E|xDtq02RQ !:eqDҙnQڄ "|"MR1! 9 P5$qА408K.CqN@ Vk͒  $DaEi?пV[΢pVR ;ER&E]r>SŸ'dH2NxPB)VlS PGH;da iƸRH*$ ,P mmZqÍp FOFxd qWUPjC+h@"Xa=W\2 ,\ C7g A1џs(5=€Q.\ +v  NT_BtNQ!D0Pa !4O+D d-߉:dZ[L^.,oI8C$D-©4خ=)W`w~Yn 4 3e!h YQjZR V`Eę$<90A!\ yAjP_!GXѫRAHI;S\DB`C6aM#З3Vo۽lGz1) L[X"\$}MqBmM=-/Kb7*bAEy7m;v1$B R- U:V,pa,%B ?@$ BaP)dC/Hp9C ++8)rQ$NV˅0JxPC5RYAw Ɖ@WVkUּ̦WeW ;b0`0 Su;eBqʅ2W?dj1 bC4rA _Yv A$FItX yclJ$۶Db{L ĵ%RUZ k#EUpRh]/Ǖ-Vr\ڐ((J-hs9\(#al 2@$ 7b)AT4kCZffX5faJ@D COmG.!`|T2 YnR܄8z*w`%*vgZFp9H@+ YTU!i* ^c| 5Y*9dg.D*Bx@5K!MWVS9y#rяfeEc-B0"^/"1BެakHRh( *'a{ ' jFɰl %4$>D9_àaz6 hVҢ\CmDYv!H4qޘ:Gl)tx xA,JD5c/Ev@scneNjt(B*" !dƑig0)nж9)" `ttaMS @ P5tB/ I "4)q=Ǻcb Ւ; hy)”/QCtS1AJ 𭠣9G tN`F&XSaLB! 삌11TOQxsPM H,'R0CphPAVЗg bPI7ޥzلrZKYm-PUD0E!|DJ TAE1#@b eQx&=\n%|%(AI-)c q,v .S]P.'#Ĉv p(W.(TlJXA]P9>(.BhN :K 6 WA]1DFd%JlX+u=@ i]0dTɅ>Y 30poL܊ EA< 1G+yI R6ac`Qa)tMWB5Z[V}xFͫd=JI YB,x?6Bs8<08'7KPŴ:[L[Dȗ Oad,"G l0D"8pnH\PN&RCU-"(" ^67A DB鈴t& 0NИ?I0G yUZ ` |0Êl: ׉'b✓m$H N<=B ] HFZ\aj.MSoMÊN``@)V MZ F zP1gC* @~A vr|GN AAb3ъza^m\q*j!d@ &*_rFA2E n r ?@$ BaPd6@ @-X/C a0229 J[$c"(r[d2H:`WK5GAS):PЂ@ IVci*Ip2ݕ aJ 6]^QHh+E! *n7cY0|V+ ev뗃 S1 lD<  %;_8dr`W7Ai"xZ\#߂ "G WǓY,ZXv?;!fb(tJ=# B'2 A<D(#%!RSTQZȑdQBoGp^D6,L !T&X ?byg #@ЄezhB]Sh7|D _DکO zЖ&)z^ 8MD - U%IO LŁ`)  L@P@ed @u q(8 qf>5Ht_)6zw\P$q]5Qz »΃!>S.UY X`-h]Pkd*(QENj8 ;"HZ+H?o:45LR0JΖ`t =) `!Rq:ygW ϣ8yNR,5|nh}mWQ>& Qxd_Dl~^6p]ZN"UNb;)(YlZ`PquݠMEϺJ 7YXV0 %Apy_q…`0Jbf`5 [ƒae("$g`? d 3 6 %rP "25K ,PDa`[e8PP>!0Cu<˓a$Ģ\ řAb15!3r{BHtã#S PchME:@M a-畳hm|p V #p0n$،pO`o R,ElҤPXΏ|udq__qdA $[K!Y `BQyewp(2lm m\ -Q\zOy<' B8dУ4NC"' P >& AD.ZH)02PAm`Wk8VI`E_3Ȥy/ycnk^i*P ^FPS !DrZ>[ :>P-!ݐ9hPErkD4+3"h\r3aƟ' Zcg:d.ZYhS>DV f'@G2`*E赩PhM'  -f nP(e,WG^Z bȑ ` Q,%}}H@d@GIxD$dprNN]D&jSPGe<fgŬ!V IAx/`Kq`@ (@2GuČ~ A:`KFwTx+P8@T Q=|zFצQ{1 7PC?akؕ94"$""(-hJH(63_-86;sYXc6_ bZ6כcbAA_axOu >¹ }],}60k=HܹL].JrYK" V L(( MG36w XNC7+׸B {o49R|LHSH +|#W{5B,Ϗ" cA˜vc &"%-qѢe:ɉ_^r_AR )}>B N J,z ^H` *P!npv {C ?@$ BaPd6D`xATBl6Aa-A/O'~e2,uA'PQ(1OjU:VW]Y(=,Gqh[+ _w8+}TUh  䐵~ U/7WEc=TOM VC%=dR("?/~?Ʉws}pt2!BAN39u r#@8 6aOem@ P( -+G zTEP+ (€ (* 4&a9!~‹.RJ'(YhYd6MDaGsBȴRxT%ɈG&f:(P.)L~̍@@Z9sTbx}NT^t & `(B^W\)R brA %"IObDTT`- FT?>C8!lڂ ybHo؂pCDQE8d) >&Iݼg"5Ҫ(X((('-Kdqr 81bCh ͓7hJ}8s`X\ d/!* 0xgX6)G.:NVҸDzH)(I!`X dKn fL!HzFp;Uf! 7$&Ihڶ]\lięSzɟ(E(Q&Ő. br`5Jbyz^M(Bδh ߞ>#wx5*zt]hADBc> $[#J}_j|H9Fd]nr\S 9C.@D! 8-E!xb)E0`9rAa !4ň zI"Pr(em>A>'VU?lt`(B ~{ vnS@9peuKA%DHx=€Q ` M c!}>#F\` (Y*'"LybZQ"$WodIрqR!rN6eTblz]xrD$ HԨ/C|v!17q蜌~Qf2!J*R 'Qc98 v̂98q 9@#QԚ]zjs nP*@XAz>!u }'@a⦚Eм:F:L&bVNUPTh/ uTA_A(=*@D: nCQQ4= -5-$ !ǭ]\4ƹfx<(\A pX@/a(e\+!`#@ED fE&W > c0BHF`6APpP,rp™q Ha>X Mfhs&A$#{tr*N08O 4tY1.]BD SjHlJ>.IAj(A/@ܻxg \v`ii 1YEtw7lbXF/Z~I D).j<[W aU"ýD D))9L3@RR(DbW Ca $Ֆ:H bҧ3I LcP4x "DI05,#Q-&ߍ;w-NЖPڎȾ6A8V\Olɣ͠BW~ڎ;n#UZ46Ml ݜYV Z~-v켖](*D!,E#wf?l؍^[ʗ҉iH)"=ѡ8"I!$i_C-LB"PfT{Xk _q!\o(U%y܂C -oB(E̅Q pjLM / cd82w3@9H&6V6ue^ޞ }ݛj(F%V6ddW> 2 bDOc 3CI k{I"#.9 ~B:hcOH=9!݄Ff8G !᫻9Ÿ"x'o(v4 A`z Sw>/qBn h}2BHHPK(ACb B|O rYK6 D. By,*b"/VQr9kb|'!A޺*!|DBA*j Ɯx%Yb`Px5a!T!V0V -`;aFa! -21~Z P  0JOZd\V`m=(wb B M"=P"Q /d`! "C" @aN)l)CiH@4u/&3` qXխ#|'*aA 4lA>G)\EZ@  Cb4fbTQ !͒" VQ[f.!'xHL ,Ar#Px,t`1_]!0 at ₨hyb|0`NFtRaP0 0 pu4! hD**t'~o{m4 º+0ئ*f!Ę!4.a!/"R$ ?@$ BaPd6DbQ8Ve8u-~4dQhKLR("!PVR*ȌBapʅI-G$DE$%RqUi f6#<ә$K%LvK&D?nPX.BƗY-sC8;,BA!&!eRjrYϖ=e TnjCaEꠧ2W% ,P10B''=\:1+s\g$ɐIXUHfal!d؎$& ?6 aب*Y(eZeAw?n[af?cHh/ZN^e p!!aT{ +X0L99mehZ {aa#8d8p*)OBJH:N F |J{y@ x]MӡGQKDQ@e Hd-AY=IB<}""0㰃3]^Ů?ɲv""(J5 1L `m B }V_s#vT4`FU@ 0S`qq8Fm@A![l  ޜߏ>XBY R=a@%pAh2D tQ_Ȩ7G({P T >?BbqD(G8yJ܁ǸI>9 !DqEH#K ?@$ BaPd6DbQ8V-FcQv=HdR9$M'd]/LfS9m7Ndr}?PhT:%GO)e6OTjU8u*WVkUv^^^_ _(== 7'+0\8CMYs]=J|DepC  R kl`[`[$$If!vh#v9):V 706,59)ap T$$If!vh#vd #v #v#vV :V 706,5d 5 55V ap(T$$If!vh#vd #v #v#vV :V 706,5d 5 55V ap(T$$If!vh#vd #v:V 706,5d 5apT$$If!vh#v9):V 706,59)ap T$$If!vh#vd #v #v#vV :V 706,5d 5 55V ap(T$$If!vh#vd #v:V 706,5d 5apT$$If!vh#vd #v:V 706,5d 5apT$$If!vh#vd #v:V 06,5d 5apyt"<T$$If!vh#vd #v:V 706,5d 5apT$$If!vh#vd #v:V 706,5d 5apT$$If!vh#vd #v:V 706,5d 5apT$$If!vh#v9):V 706,59)ap T$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apT$$If!vh#vz #v:V 706,5z 5apTxe0660666668&6FVfv6888&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv&6FVfv8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@66666PJ_HmH nHsH tHJ`J e$cke $1$a$ CJKH_HaJmH nHsH tH$A`$ ؞k=W[SONi@N nfh*ph:v!: +h0*gYtvcSB*ph`^\q ToT 2 fontstyle01%56CJOJQJ\]aJo(phPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭VCݓvUA 6F͌n|QsAX\ >8O( b\'X77?ڐ!@5?2XY}XFKp GH%Vވ b׫|G_9Ѣ`(B-)( b"{G|07`]PEB_?1r!?S`m-ʥV_\ĵJNS.j4Cw\+ZxC筲/-xkP//z֯A)_BJP5f CFr]]*Q Yv)CeCP@$=9I!_vHB%(fV va ߒ602- "O9IdͿ Z}r'=ySZ%{W<wo~ omͩv{_8}:oq3]ac.`/& 1%@)+-Z ȁcۏ9T" X;adwuƝ^lnmM]\('PbKe#bc{lcwK 6qKzV6B$L\!ޖov{uF]n# ]L-7Bc".$C΄M\KHt)Z,Kf~APܜaߥFrIF.;1dFą84(twk>VϮšQw[Yۙ!®R#nq̎8R{ccާuX>IlcWbFv fNall \ᙠ8B|=V>LI}:^ DVSn<<s< /,ݔyoZ"-XETsbc~h0pd<F7qsGqǭتUtՒfn~i0> LDCY,XW#HGe lܸd|0duޑChϐPڑw>ufІE%=qvQ90`ǙȰR@x pf]6H:EuvVd^(gpL%Ste5@(ً0$$E$} Ns;{/,,+P-jYTk~" q0TPϢ>#̙V=ˀ<ݥvH[$tIhO-xj<4.<= mR+Q.5qͯ!e(C82Q#W.Dxҗ<}/SY.d0u.:i5ܣ$jYhkV\[򡑃A!K3Ɗtz >λZ`%N88zt"Hr8 ^So YsiZvwQ:uDM;YS.}jd{jSnuҮ{Q4iU5U̲0ks\7X\ 5i/Z77'd]u j1bXU͞ڽc3IU2S;緬G8:?g-, gs~unfC(MrT Jxi D=deCn PK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 0_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Rtheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] 5!lh ! 7E2UbF 5! !$%')*,.0246 ~  + e 0M%:Vu1< 3!5!"#&(+-/135  U Z 5XXXl,b$=\1rsn;A_2l@(  ~  :A(8?? VGr 1#" ?B S  ?5 T#+ 7{/=N]nszS[q733333333333333333}6f1PN a *;Wi| ;=e 27e V W $%'FF 12247r4KH=W]W6\.-8MJ [ I 6W2z9 e$Jv$)3*i-1/%1{1|59N;MP;"<_=6D$jLO QimQ *S%qY)[\Iab+h &k Ym+u?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdeghijklmopqrstuvwxyz{|}~Root Entry FData f1Tablen0&WordDocumentsSummaryInformation(DocumentSummaryInformation8CompObjn  FMicrosoft Word 97-2003 ĵ MSWordDocWord.Document.89q