Endpoint security and compliance management design guide: using IBM Tivoli Endpoint Manager
Gespeichert in:
Körperschaft: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Poughkeepsie, N.Y.
IBM Corp., International Technical Support Organization
2012
|
Schriftenreihe: | IBM Redbooks
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/0738436984/?ar |
Beschreibung: | Includes bibliographical references (pages 399-400). - Online resource; title from cover (Safari, viewed Feb. 13, 2013) |
Umfang: | 1 Online-Ressource (ix-xvi, 400 Seiten) illustrations. |
ISBN: | 0738436984 9780738436982 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051691043 | ||
003 | DE-627-1 | ||
005 | 20240228115147.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2012 xx |||||o 00| ||eng c | ||
020 | |a 0738436984 |9 0-7384-3698-4 | ||
020 | |a 9780738436982 |9 978-0-7384-3698-2 | ||
035 | |a (DE-627-1)051691043 | ||
035 | |a (DE-599)KEP051691043 | ||
035 | |a (ORHE)0738436984 | ||
035 | |a (DE-627-1)051691043 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
245 | 1 | 0 | |a Endpoint security and compliance management design guide |b using IBM Tivoli Endpoint Manager |c Axel Buecker [and others] |
264 | 1 | |a Poughkeepsie, N.Y. |b IBM Corp., International Technical Support Organization |c 2012 | |
300 | |a 1 Online-Ressource (ix-xvi, 400 Seiten) |b illustrations. | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a IBM Redbooks | |
500 | |a Includes bibliographical references (pages 399-400). - Online resource; title from cover (Safari, viewed Feb. 13, 2013) | ||
546 | |a English. | ||
630 | 2 | 0 | |a IBM Tivoli endpoint manager |
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer networks |x Access control | |
650 | 0 | |a Computer security | |
650 | 0 | |a IBM computers |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a IBM Tivoli endpoint manager | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer networks ; Access control | |
650 | 4 | |a Computer security | |
650 | 4 | |a IBM computers ; Security measures | |
650 | 4 | |a Management | |
650 | 4 | |a Business & Economics | |
650 | 4 | |a Management Theory | |
700 | 1 | |a Bücker, Axel |e MitwirkendeR |4 ctb | |
710 | 2 | |a International Business Machines Corporation. |b International Technical Support Organization. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 0738436984 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0738436984 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/0738436984/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-051691043 |
---|---|
_version_ | 1821494843072839680 |
adam_text | |
any_adam_object | |
author2 | Bücker, Axel |
author2_role | ctb |
author2_variant | a b ab |
author_corporate | International Business Machines Corporation. International Technical Support Organization |
author_corporate_role | ctb |
author_facet | Bücker, Axel International Business Machines Corporation. International Technical Support Organization |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051691043 (DE-599)KEP051691043 (ORHE)0738436984 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02231cam a22005652 4500</leader><controlfield tag="001">ZDB-30-ORH-051691043</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115147.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0738436984</subfield><subfield code="9">0-7384-3698-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780738436982</subfield><subfield code="9">978-0-7384-3698-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051691043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051691043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)0738436984</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051691043</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Endpoint security and compliance management design guide</subfield><subfield code="b">using IBM Tivoli Endpoint Manager</subfield><subfield code="c">Axel Buecker [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Poughkeepsie, N.Y.</subfield><subfield code="b">IBM Corp., International Technical Support Organization</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix-xvi, 400 Seiten)</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">IBM Redbooks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 399-400). - Online resource; title from cover (Safari, viewed Feb. 13, 2013)</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">IBM Tivoli endpoint manager</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">IBM computers</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM Tivoli endpoint manager</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">IBM computers ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business & Economics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management Theory</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bücker, Axel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Business Machines Corporation.</subfield><subfield code="b">International Technical Support Organization.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">0738436984</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0738436984</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/0738436984/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051691043 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:49Z |
institution | BVB |
isbn | 0738436984 9780738436982 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (ix-xvi, 400 Seiten) illustrations. |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | IBM Corp., International Technical Support Organization |
record_format | marc |
series2 | IBM Redbooks |
spelling | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager Axel Buecker [and others] Poughkeepsie, N.Y. IBM Corp., International Technical Support Organization 2012 1 Online-Ressource (ix-xvi, 400 Seiten) illustrations. Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier IBM Redbooks Includes bibliographical references (pages 399-400). - Online resource; title from cover (Safari, viewed Feb. 13, 2013) English. IBM Tivoli endpoint manager Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures Management Business & Economics Management Theory Bücker, Axel MitwirkendeR ctb International Business Machines Corporation. International Technical Support Organization. MitwirkendeR ctb 0738436984 Erscheint auch als Druck-Ausgabe 0738436984 |
spellingShingle | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager IBM Tivoli endpoint manager Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures Management Business & Economics Management Theory |
title | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager |
title_auth | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager |
title_exact_search | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager |
title_full | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager Axel Buecker [and others] |
title_fullStr | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager Axel Buecker [and others] |
title_full_unstemmed | Endpoint security and compliance management design guide using IBM Tivoli Endpoint Manager Axel Buecker [and others] |
title_short | Endpoint security and compliance management design guide |
title_sort | endpoint security and compliance management design guide using ibm tivoli endpoint manager |
title_sub | using IBM Tivoli Endpoint Manager |
topic | IBM Tivoli endpoint manager Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures Management Business & Economics Management Theory |
topic_facet | IBM Tivoli endpoint manager Business enterprises Computer networks Security measures Computer networks Access control Computer security IBM computers Security measures Computer Security Sécurité informatique Business enterprises ; Computer networks ; Security measures Computer networks ; Access control IBM computers ; Security measures Management Business & Economics Management Theory |
work_keys_str_mv | AT buckeraxel endpointsecurityandcompliancemanagementdesignguideusingibmtivoliendpointmanager AT internationalbusinessmachinescorporationinternationaltechnicalsupportorganization endpointsecurityandcompliancemanagementdesignguideusingibmtivoliendpointmanager |