|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn933389414 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151223t20152016caua o 001 0 eng d |
010 |
|
|
|a 2016448129
|
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d DEBBG
|d DEBSZ
|d COO
|d CEF
|d OCLCQ
|d WYU
|d C6I
|d UAB
|d VT2
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 1066586724
|a 1103250467
|
020 |
|
|
|a 1491941200
|
020 |
|
|
|a 9781491941201
|
020 |
|
|
|z 9781491941201
|
029 |
1 |
|
|a DEBBG
|b BV043968529
|
029 |
1 |
|
|a DEBSZ
|b 485790319
|
029 |
1 |
|
|a GBVCP
|b 88275050X
|
035 |
|
|
|a (OCoLC)933389414
|z (OCoLC)1066586724
|z (OCoLC)1103250467
|
037 |
|
|
|a CL0500000693
|b Safari Books Online
|
050 |
|
4 |
|a QA76.585
|
082 |
0 |
4 |
|a 004.6/782
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Martinelli, Steve,
|e author.
|
245 |
1 |
0 |
|a Identity, authentication, and access management in OpenStack :
|b implementing and deploying Keystone, OpenStack's identity service /
|c Steve Martinelli, Henry Nash, and Brad Topol.
|
246 |
3 |
0 |
|a Implementing and deploying Keystone, OpenStack's identity service
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Sebastopol, CA :
|b O'Reilly Media,
|c 2015.
|
264 |
|
4 |
|c Ã2016
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed December 22, 2015).
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a "Keystone--OpenStack's identity service--provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access. Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the infrastructure-as-a-service layer--as well as key practices for safeguarding your cloud's ongoing security."--Page 4 of cover.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cloud computing.
|
650 |
|
0 |
|a Web services.
|
650 |
|
0 |
|a Open source software.
|
650 |
|
6 |
|a Infonuagique.
|
650 |
|
6 |
|a Services Web.
|
650 |
|
6 |
|a Logiciels libres.
|
650 |
|
7 |
|a Cloud computing.
|2 fast
|0 (OCoLC)fst01745899
|
650 |
|
7 |
|a Open source software.
|2 fast
|0 (OCoLC)fst01046097
|
650 |
|
7 |
|a Web services.
|2 fast
|0 (OCoLC)fst01173242
|
700 |
1 |
|
|a Nash, Henry,
|e author.
|
700 |
1 |
|
|a Topol, Brad,
|e author.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781491941249/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|