Microsoft forefront identity manager 2010 R2 handbook: a complete handbook on FIM 2010 R2 covering both identity and certificate management
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Pub.
©2012
|
Schriftenreihe: | Professional expertise distilled
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them |
Beschreibung: | 1 Online-Ressource |
ISBN: | 1283593998 1849685363 1849685371 9781283593991 9781849685368 9781849685375 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043094655 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 1283593998 |c electronic bk. |9 1-283-59399-8 | ||
020 | |a 1849685363 |9 1-84968-536-3 | ||
020 | |a 1849685371 |c electronic bk. |9 1-84968-537-1 | ||
020 | |a 9781283593991 |c electronic bk. |9 978-1-283-59399-1 | ||
020 | |a 9781849685368 |9 978-1-84968-536-8 | ||
020 | |a 9781849685375 |c electronic bk. |9 978-1-84968-537-5 | ||
035 | |a (OCoLC)810317545 | ||
035 | |a (DE-599)BVBBV043094655 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Nordström, Kent |e Verfasser |4 aut | |
245 | 1 | 0 | |a Microsoft forefront identity manager 2010 R2 handbook |b a complete handbook on FIM 2010 R2 covering both identity and certificate management |c Kent Nordström |
264 | 1 | |a Birmingham, UK |b Packt Pub. |c ©2012 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Professional expertise distilled | |
500 | |a Includes index | ||
500 | |a Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them | ||
650 | 4 | |a Computer networks / Security measures / Handbooks, manuals, etc | |
650 | 7 | |a COMPUTERS S / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS S / Security / Online Safety & Privacy |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028518847 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175498779033600 |
---|---|
any_adam_object | |
author | Nordström, Kent |
author_facet | Nordström, Kent |
author_role | aut |
author_sort | Nordström, Kent |
author_variant | k n kn |
building | Verbundindex |
bvnumber | BV043094655 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)810317545 (DE-599)BVBBV043094655 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02680nmm a2200469zc 4500</leader><controlfield tag="001">BV043094655</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283593998</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-283-59399-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685363</subfield><subfield code="9">1-84968-536-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685371</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84968-537-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283593991</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-283-59399-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685368</subfield><subfield code="9">978-1-84968-536-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685375</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84968-537-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)810317545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043094655</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nordström, Kent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft forefront identity manager 2010 R2 handbook</subfield><subfield code="b">a complete handbook on FIM 2010 R2 covering both identity and certificate management</subfield><subfield code="c">Kent Nordström</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">©2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S / Security / Online Safety & Privacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028518847</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043094655 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:15Z |
institution | BVB |
isbn | 1283593998 1849685363 1849685371 9781283593991 9781849685368 9781849685375 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028518847 |
oclc_num | 810317545 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub. |
record_format | marc |
series2 | Professional expertise distilled |
spelling | Nordström, Kent Verfasser aut Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordström Birmingham, UK Packt Pub. ©2012 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier Professional expertise distilled Includes index Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281 Aggregator Volltext |
spellingShingle | Nordström, Kent Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc |
title | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_auth | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_exact_search | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_full | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordström |
title_fullStr | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordström |
title_full_unstemmed | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordström |
title_short | Microsoft forefront identity manager 2010 R2 handbook |
title_sort | microsoft forefront identity manager 2010 r2 handbook a complete handbook on fim 2010 r2 covering both identity and certificate management |
title_sub | a complete handbook on FIM 2010 R2 covering both identity and certificate management |
topic | Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc |
topic_facet | Computer networks / Security measures / Handbooks, manuals, etc COMPUTERS S / Security / Networking COMPUTERS S / Security / Online Safety & Privacy Computer networks / Security measures Computer networks Security measures Handbooks, manuals, etc |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=481281 |
work_keys_str_mv | AT nordstromkent microsoftforefrontidentitymanager2010r2handbookacompletehandbookonfim2010r2coveringbothidentityandcertificatemanagement |