000857547 000__ 01554cam\a2200409Mu\4500 000857547 001__ 857547 000857547 005__ 20230306145206.0 000857547 006__ m\\\\\o\\d\\\\\\\\ 000857547 007__ cr\un\nnnunnun 000857547 008__ 181222s2018\\\\cau\\\\\o\\\\\000\0\eng\d 000857547 020__ $$a9781484226018$$q(electronic book) 000857547 020__ $$a1484226011$$q(electronic book) 000857547 020__ $$z9781484226001 000857547 035__ $$aSP(OCoLC)on1080078199 000857547 035__ $$aSP(OCoLC)1080078199 000857547 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE 000857547 049__ $$aISEA 000857547 050_4 $$aTK5105.597 000857547 08204 $$a005.8$$223 000857547 1001_ $$aSchwartz, Michael. 000857547 24510 $$aSecuring the Perimeter :$$bDeploying Identity and Access Management with Free Open Source Software. 000857547 260__ $$aBerkeley, CA :$$bApress L. P.,$$c2018. 000857547 300__ $$a1 online resource (383 pages) 000857547 336__ $$atext$$btxt$$2rdacontent 000857547 337__ $$aunmediated$$bn$$2rdamedia 000857547 338__ $$avolume$$bnc$$2rdacarrier 000857547 506__ $$aAccess limited to authorized users. 000857547 588__ $$aDescription based on print version record. 000857547 650_0 $$aComputer networks$$xAccess control. 000857547 650_0 $$aComputers$$xAccess control. 000857547 650_0 $$aOpen source software. 000857547 7001_ $$aMachulak, M. P.$$q(Maciej P.) 000857547 77608 $$iPrint version:$$aSchwartz, Michael$$tSecuring the Perimeter : Deploying Identity and Access Management with Free Open Source Software$$dBerkeley, CA : Apress L. P.,c2018$$z9781484226001 000857547 852__ $$bebk 000857547 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-2601-8$$zOnline Access$$91397441.1 000857547 909CO $$ooai:library.usi.edu:857547$$pGLOBAL_SET 000857547 980__ $$aEBOOK 000857547 980__ $$aBIB 000857547 982__ $$aEbook 000857547 983__ $$aOnline 000857547 994__ $$a92$$bISE