LEADER 01798nmm a2200445 u 4500
001 EB002180854
003 EBX01000000000000001318341
005 00000000000000.0
007 cr|||||||||||||||||||||
008 231010 ||| eng
020 |a 9781098131869 
020 |a 9781098131852 
020 |a 1098131851 
050 4 |a TK5105.59 
100 1 |a Kontsevoy, Ev 
245 0 0 |a Identity-native infrastructure access management  |b preventing breaches by eliminating secrets and adopting zero trust  |c Ev Kontsevoy, Sakshyam Shah & Peter Conrad 
260 |a Sebastopol, CA  |b O'Reilly Media, Inc.  |c 2023 
300 |a 1 online resource 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Cyberinfrastructure / Security measures / fast / (OCoLC)fst02031377 
653 |a Computer networks / Security measures 
653 |a Computer networks / Security measures / fast / (OCoLC)fst00872341 
653 |a Cyberinfrastructure / Security measures / http://id.loc.gov/authorities/subjects/sh2021001609 
653 |a Réseaux d'ordinateurs / Architectures 
653 |a Computer network architectures / http://id.loc.gov/authorities/subjects/sh86007468 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer network architectures / fast / (OCoLC)fst00872277 
700 1 |a Shah, Sakshyam  |e author 
700 1 |a Conrad, Peter  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
776 |z 1098131851 
776 |z 9781098131890 
776 |z 9781098131869 
776 |z 1098131894 
776 |z 9781098131852 
776 |z 109813186X 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098131883/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 005.8