Enterprise Single Sign-On design guide : using IBM Security Access Manager for Enterprise Single Sign-On 8.2 /
Saved in:
Edition: | 3rd ed. |
---|---|
Imprint: | Poughkeepsie, N.Y. : IBM Corp., International Technical Support Organization, 2012. |
Description: | 1 online resource (1 volume) : illustrations |
Language: | English |
Series: | IBM redbooks IBM redbooks. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/13619166 |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | 13619166 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140214s2012 nyua ob 000 0 eng d | ||
005 | 20241126151227.4 | ||
020 | |a 0738437034 | ||
020 | |a 9780738437033 | ||
020 | |z 9780738437033 | ||
035 | 9 | |a (OCLCCM-CC)870550941 | |
035 | |a (OCoLC)870550941 | ||
037 | |a CL0500000381 |b Safari Books Online | ||
040 | |a UMI |b eng |e pn |c UMI |d COO |d DEBBG |d DEBSZ |d OCLCQ |d OCLCF |d OCLCQ |d CEF |d OCLCQ |d OCLCA |d AU@ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a MAIN | ||
050 | 4 | |a TK5105.59 |b .E68 2012 | |
245 | 0 | 0 | |a Enterprise Single Sign-On design guide : |b using IBM Security Access Manager for Enterprise Single Sign-On 8.2 / |c Axel Buecker [and others]. |
246 | 3 | 0 | |a Using IBM Security Access Manager for Enterprise Single Sign-On 8.2 |
250 | |a 3rd ed. | ||
260 | |a Poughkeepsie, N.Y. : |b IBM Corp., International Technical Support Organization, |c 2012. | ||
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a IBM redbooks | |
588 | 0 | |a Online resource; title from cover (Safari, viewed February 4, 2014). | |
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computers |x Access control |x Passwords. |0 http://id.loc.gov/authorities/subjects/sh85029555 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Ordinateurs |x Accès |x Contrôle |x Mots de passe. | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computers |x Access control |x Passwords |2 fast | |
700 | 1 | |a Bücker, Axel. |0 http://id.loc.gov/authorities/names/n2002015337 | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization. | |
758 | |i has work: |a Enterprise Single Sign-On design guide (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH986mmQ64jYgkRG8JHkCP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a IBM redbooks. |0 http://id.loc.gov/authorities/names/n00008733 | |
856 | 4 | 0 | |u https://go.oreilly.com/uchicago/library/view/-/0738437034/?ar |y O'Reilly |
929 | |a oclccm | ||
999 | f | f | |s 9b935b7d-7195-4c10-9f1c-c4ad6e84fdd6 |i c3c6d552-cd09-4c37-b351-22a6ff771923 |
928 | |t Library of Congress classification |a TK5105.59.E68 2012 |l Online |c UC-FullText |u https://go.oreilly.com/uchicago/library/view/-/0738437034/?ar |z O'Reilly |g ebooks |i 13762106 |