Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berkeley, CA
Apress
2021
Berkeley, CA |
Ausgabe: | First edition 2021 |
Schlagworte: | |
Online-Zugang: | FAB01 FAW01 FAW02 FHA01 FHD01 FHI01 FHM01 FHN01 FHO01 FHR01 FKE01 FLA01 FWS01 FWS02 HTW01 UBW01 Volltext |
Beschreibung: | 1 Online-Ressource (XIX, 233 Seiten) 23 Illustrationen |
ISBN: | 9781484264348 |
DOI: | 10.1007/978-1-4842-6434-8 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047047949 | ||
003 | DE-604 | ||
005 | 20221011 | ||
007 | cr|uuu---uuuuu | ||
008 | 201207s2021 |||| o||u| ||||||eng d | ||
020 | |a 9781484264348 |c Online |9 978-1-4842-6434-8 | ||
024 | 7 | |a 10.1007/978-1-4842-6434-8 |2 doi | |
035 | |a (ZDB-2-CWD)9781484264348 | ||
035 | |a (OCoLC)1226702990 | ||
035 | |a (DE-599)BVBBV047047949 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-863 |a DE-1050 |a DE-1043 |a DE-862 |a DE-M347 |a DE-573 |a DE-1046 |a DE-1047 |a DE-188 |a DE-898 |a DE-859 |a DE-523 |a DE-92 |a DE-20 |a DE-Aug4 |a DE-1051 |a DE-860 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Chatterjee, Rithik |e Verfasser |0 (DE-588)122682689X |4 aut | |
245 | 1 | 0 | |a Red Hat and IT Security |b With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |c by Rithik Chatterjee |
250 | |a First edition 2021 | ||
264 | 1 | |a Berkeley, CA |b Apress |c 2021 | |
264 | 1 | |a Berkeley, CA |b Apress | |
300 | |a 1 Online-Ressource (XIX, 233 Seiten) |b 23 Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Open Source | |
650 | 4 | |a Computer security | |
650 | 4 | |a Open source software | |
650 | 4 | |a Computer programming | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-6433-1 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-4842-6435-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4842-6434-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-CWD | ||
940 | 1 | |q ZDB-2-CWD_2021 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032455351 | ||
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FAB01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FAW01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FAW02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHA01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHD01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHI01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHM01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHN01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHO01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FHR01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FKE01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FLA01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FWS01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l FWS02 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l HTW01 |p ZDB-2-CWD |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4842-6434-8 |l UBW01 |p ZDB-2-CWD |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 862608 |
---|---|
_version_ | 1806193897273032704 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Chatterjee, Rithik |
author_GND | (DE-588)122682689X |
author_facet | Chatterjee, Rithik |
author_role | aut |
author_sort | Chatterjee, Rithik |
author_variant | r c rc |
building | Verbundindex |
bvnumber | BV047047949 |
collection | ZDB-2-CWD |
ctrlnum | (ZDB-2-CWD)9781484264348 (OCoLC)1226702990 (DE-599)BVBBV047047949 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-1-4842-6434-8 |
edition | First edition 2021 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03412nmm a2200685zc 4500</leader><controlfield tag="001">BV047047949</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221011 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">201207s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484264348</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4842-6434-8</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4842-6434-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-CWD)9781484264348</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1226702990</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047047949</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chatterjee, Rithik</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122682689X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Red Hat and IT Security</subfield><subfield code="b">With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing</subfield><subfield code="c">by Rithik Chatterjee</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIX, 233 Seiten)</subfield><subfield code="b">23 Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open Source</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer programming</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-6433-1</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-4842-6435-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-CWD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-CWD_2021</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032455351</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHO01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4842-6434-8</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-CWD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047047949 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:07:25Z |
indexdate | 2024-08-01T15:58:49Z |
institution | BVB |
isbn | 9781484264348 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032455351 |
oclc_num | 1226702990 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS DE-1050 DE-1043 DE-862 DE-BY-FWS DE-M347 DE-573 DE-1046 DE-1047 DE-188 DE-898 DE-BY-UBR DE-859 DE-523 DE-92 DE-20 DE-Aug4 DE-1051 DE-860 |
owner_facet | DE-863 DE-BY-FWS DE-1050 DE-1043 DE-862 DE-BY-FWS DE-M347 DE-573 DE-1046 DE-1047 DE-188 DE-898 DE-BY-UBR DE-859 DE-523 DE-92 DE-20 DE-Aug4 DE-1051 DE-860 |
physical | 1 Online-Ressource (XIX, 233 Seiten) 23 Illustrationen |
psigel | ZDB-2-CWD ZDB-2-CWD_2021 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Apress |
record_format | marc |
spellingShingle | Chatterjee, Rithik Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing Systems and Data Security Open Source Computer security Open source software Computer programming Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 |
title | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |
title_auth | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |
title_exact_search | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |
title_exact_search_txtP | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |
title_full | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing by Rithik Chatterjee |
title_fullStr | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing by Rithik Chatterjee |
title_full_unstemmed | Red Hat and IT Security With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing by Rithik Chatterjee |
title_short | Red Hat and IT Security |
title_sort | red hat and it security with red hat ansible red hat openshift and red hat security auditing |
title_sub | With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing |
topic | Systems and Data Security Open Source Computer security Open source software Computer programming Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Systems and Data Security Open Source Computer security Open source software Computer programming Datenschutz Computersicherheit |
url | https://doi.org/10.1007/978-1-4842-6434-8 |
work_keys_str_mv | AT chatterjeerithik redhatanditsecuritywithredhatansibleredhatopenshiftandredhatsecurityauditing |