|
|
|
|
LEADER |
01798nmm a2200445 u 4500 |
001 |
EB002180854 |
003 |
EBX01000000000000001318341 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
231010 ||| eng |
020 |
|
|
|a 9781098131869
|
020 |
|
|
|a 9781098131852
|
020 |
|
|
|a 1098131851
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Kontsevoy, Ev
|
245 |
0 |
0 |
|a Identity-native infrastructure access management
|b preventing breaches by eliminating secrets and adopting zero trust
|c Ev Kontsevoy, Sakshyam Shah & Peter Conrad
|
260 |
|
|
|a Sebastopol, CA
|b O'Reilly Media, Inc.
|c 2023
|
300 |
|
|
|a 1 online resource
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Cyberinfrastructure / Security measures / fast / (OCoLC)fst02031377
|
653 |
|
|
|a Computer networks / Security measures
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Cyberinfrastructure / Security measures / http://id.loc.gov/authorities/subjects/sh2021001609
|
653 |
|
|
|a Réseaux d'ordinateurs / Architectures
|
653 |
|
|
|a Computer network architectures / http://id.loc.gov/authorities/subjects/sh86007468
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Computer network architectures / fast / (OCoLC)fst00872277
|
700 |
1 |
|
|a Shah, Sakshyam
|e author
|
700 |
1 |
|
|a Conrad, Peter
|e author
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 1098131851
|
776 |
|
|
|z 9781098131890
|
776 |
|
|
|z 9781098131869
|
776 |
|
|
|z 1098131894
|
776 |
|
|
|z 9781098131852
|
776 |
|
|
|z 109813186X
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098131883/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|