Microsoft forefront identity manager 2010 R2 handbook: a complete handbook on FIM 2010 R2 covering both identity and certificate management
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Pub.
2012
|
Schriftenreihe: | Professional expertise distilled
|
Schlagworte: | |
Beschreibung: | 1 online resource |
ISBN: | 9781849685375 1849685371 1283593998 9781283593991 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349742 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781849685375 |9 978-1-84968-537-5 | ||
020 | |a 1849685371 |9 1-84968-537-1 | ||
020 | |a 1283593998 |9 1-283-59399-8 | ||
020 | |a 9781283593991 |9 978-1-283-59399-1 | ||
035 | |a (ZDB-4-ITC)ocn810317545 | ||
035 | |a (OCoLC)810317545 | ||
035 | |a (DE-599)BVBBV045349742 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Nordstrom, Kent |e Verfasser |4 aut | |
245 | 1 | 0 | |a Microsoft forefront identity manager 2010 R2 handbook |b a complete handbook on FIM 2010 R2 covering both identity and certificate management |c Kent Nordstrom |
264 | 1 | |a Birmingham, UK |b Packt Pub. |c 2012 | |
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Professional expertise distilled | |
505 | 8 | |a Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them | |
650 | 7 | |a COMPUTERS S / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS S / Security / Online Safety & Privacy |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736396 |
Datensatz im Suchindex
_version_ | 1804179173897404416 |
---|---|
any_adam_object | |
author | Nordstrom, Kent |
author_facet | Nordstrom, Kent |
author_role | aut |
author_sort | Nordstrom, Kent |
author_variant | k n kn |
building | Verbundindex |
bvnumber | BV045349742 |
collection | ZDB-4-ITC |
contents | Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them |
ctrlnum | (ZDB-4-ITC)ocn810317545 (OCoLC)810317545 (DE-599)BVBBV045349742 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01969nmm a2200385zc 4500</leader><controlfield tag="001">BV045349742</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849685375</subfield><subfield code="9">978-1-84968-537-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849685371</subfield><subfield code="9">1-84968-537-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283593998</subfield><subfield code="9">1-283-59399-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283593991</subfield><subfield code="9">978-1-283-59399-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn810317545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)810317545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349742</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nordstrom, Kent</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Microsoft forefront identity manager 2010 R2 handbook</subfield><subfield code="b">a complete handbook on FIM 2010 R2 covering both identity and certificate management</subfield><subfield code="c">Kent Nordstrom</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Professional expertise distilled</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS S / Security / Online Safety & Privacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736396</subfield></datafield></record></collection> |
id | DE-604.BV045349742 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781849685375 1849685371 1283593998 9781283593991 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736396 |
oclc_num | 810317545 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub. |
record_format | marc |
series2 | Professional expertise distilled |
spelling | Nordstrom, Kent Verfasser aut Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordstrom Birmingham, UK Packt Pub. 2012 1 online resource txt rdacontent c rdamedia cr rdacarrier Professional expertise distilled Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc |
spellingShingle | Nordstrom, Kent Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be taken from design, to installation, to configuration of FIM 2010 R2. If you are implementing and managing FIM 2010 R2 in your business, then this book is for you. You will need to have a basic understanding of Microsoft based infrastructure using Active Directory. If you are new to Forefront Identity Management, the case-study approach of this book will help you to understand the concepts and implement them COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc |
title | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_auth | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_exact_search | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management |
title_full | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordstrom |
title_fullStr | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordstrom |
title_full_unstemmed | Microsoft forefront identity manager 2010 R2 handbook a complete handbook on FIM 2010 R2 covering both identity and certificate management Kent Nordstrom |
title_short | Microsoft forefront identity manager 2010 R2 handbook |
title_sort | microsoft forefront identity manager 2010 r2 handbook a complete handbook on fim 2010 r2 covering both identity and certificate management |
title_sub | a complete handbook on FIM 2010 R2 covering both identity and certificate management |
topic | COMPUTERS S / Security / Networking bisacsh COMPUTERS S / Security / Online Safety & Privacy bisacsh Computer networks / Security measures fast Computer networks Security measures Handbooks, manuals, etc |
topic_facet | COMPUTERS S / Security / Networking COMPUTERS S / Security / Online Safety & Privacy Computer networks / Security measures Computer networks Security measures Handbooks, manuals, etc |
work_keys_str_mv | AT nordstromkent microsoftforefrontidentitymanager2010r2handbookacompletehandbookonfim2010r2coveringbothidentityandcertificatemanagement |