000858188 000__ 01334cam\a2200385Ii\4500 000858188 001__ 858188 000858188 005__ 20230306145247.0 000858188 006__ m\\\\\o\\d\\\\\\\\ 000858188 007__ cr\cn\nnnunnun 000858188 008__ 190128s2018\\\\cau\\\\\o\\\\\000\0\eng\d 000858188 020__ $$a9781484242308$$q(electronic book) 000858188 020__ $$a1484242300$$q(electronic book) 000858188 020__ $$z9781484242292 000858188 035__ $$aSP(OCoLC)on1083522296 000858188 035__ $$aSP(OCoLC)1083522296 000858188 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dUAB$$dUKMGB 000858188 049__ $$aISEA 000858188 050_4 $$aHF5548.4.M525 000858188 08204 $$a005.5$$223 000858188 1001_ $$aKatzer, Matthew A.,$$eauthor. 000858188 24510 $$aSecuring Office 365 :$$bmasterminding MDM and compliance in the cloud /$$cMatthew Katzer. 000858188 264_1 $$a[Berkeley, CA] :$$bApress,$$c2018. 000858188 300__ $$a1 online resource 000858188 336__ $$atext$$btxt$$2rdacontent 000858188 337__ $$acomputer$$bc$$2rdamedia 000858188 338__ $$aonline resource$$bcr$$2rdacarrier 000858188 506__ $$aAccess limited to authorized users. 000858188 588__ $$aOnline resource; title from PDF title page (viewed January 31, 2019) 000858188 63000 $$aMicrosoft Office. 000858188 650_0 $$aComputer security. 000858188 650_0 $$aBusiness$$xComputer programs. 000858188 852__ $$bebk 000858188 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-1-4842-4230-8$$zOnline Access$$91397441.1 000858188 909CO $$ooai:library.usi.edu:858188$$pGLOBAL_SET 000858188 980__ $$aEBOOK 000858188 980__ $$aBIB 000858188 982__ $$aEbook 000858188 983__ $$aOnline 000858188 994__ $$a92$$bISE