Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Akula, Madhu (VerfasserIn), Mahajan, Akash (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK Packt Publishing 2017
Schlagworte:
Online-Zugang:URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV045144005
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 180823s2017 xx a||| o|||| 00||| eng d
020 |a 9781788398725  |9 978-1-78839-872-5 
020 |a 1788398726  |9 1-78839-872-6 
035 |a (ZDB-32-STB)on1021308087 
035 |a (OCoLC)1021308087 
035 |a (DE-599)BVBBV045144005 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
100 1 |a Akula, Madhu  |e Verfasser  |4 aut 
245 1 0 |a Security automation with Ansible 2  |b leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis  |c Madhu Akula, Akash Mahajan 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2017 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on online resource; title from title page (Safari, viewed February 1, 2018) 
650 4 |a Computer networks  |x Security measures 
650 4 |a Information technology  |x Automation 
650 4 |a Information technology  |x Management 
700 1 |a Mahajan, Akash  |4 aut 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781788394512 
856 4 0 |u http://proquest.tech.safaribooksonline.de/9781788394512  |x Aggregator  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-32-STB 
912 |a ZDB-5-WPSE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030533786 

Datensatz im Suchindex

_version_ 1819303516823355392
any_adam_object
author Akula, Madhu
Mahajan, Akash
author_facet Akula, Madhu
Mahajan, Akash
author_role aut
aut
author_sort Akula, Madhu
author_variant m a ma
a m am
building Verbundindex
bvnumber BV045144005
collection ZDB-32-STB
ZDB-5-WPSE
ctrlnum (ZDB-32-STB)on1021308087
(OCoLC)1021308087
(DE-599)BVBBV045144005
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01485nam a2200373zc 4500</leader><controlfield tag="001">BV045144005</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180823s2017 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788398725</subfield><subfield code="9">978-1-78839-872-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788398726</subfield><subfield code="9">1-78839-872-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-32-STB)on1021308087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1021308087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045144005</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Akula, Madhu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security automation with Ansible 2</subfield><subfield code="b">leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis</subfield><subfield code="c">Madhu Akula, Akash Mahajan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed February 1, 2018)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Automation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mahajan, Akash</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781788394512</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9781788394512</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030533786</subfield></datafield></record></collection>
id DE-604.BV045144005
illustrated Illustrated
indexdate 2024-12-24T06:50:37Z
institution BVB
isbn 9781788398725
1788398726
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030533786
oclc_num 1021308087
open_access_boolean
physical 1 online resource (1 volume) illustrations
psigel ZDB-32-STB
ZDB-5-WPSE
publishDate 2017
publishDateSearch 2017
publishDateSort 2017
publisher Packt Publishing
record_format marc
spelling Akula, Madhu Verfasser aut
Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Madhu Akula, Akash Mahajan
Birmingham, UK Packt Publishing 2017
1 online resource (1 volume) illustrations
txt rdacontent
c rdamedia
cr rdacarrier
Description based on online resource; title from title page (Safari, viewed February 1, 2018)
Computer networks Security measures
Information technology Automation
Information technology Management
Mahajan, Akash aut
Erscheint auch als Druck-Ausgabe 9781788394512
http://proquest.tech.safaribooksonline.de/9781788394512 Aggregator URL des Erstveröffentlichers Volltext
spellingShingle Akula, Madhu
Mahajan, Akash
Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
Computer networks Security measures
Information technology Automation
Information technology Management
title Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
title_auth Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
title_exact_search Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
title_full Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Madhu Akula, Akash Mahajan
title_fullStr Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Madhu Akula, Akash Mahajan
title_full_unstemmed Security automation with Ansible 2 leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis Madhu Akula, Akash Mahajan
title_short Security automation with Ansible 2
title_sort security automation with ansible 2 leverage ansible 2 to automate complex security tasks like application security network security and malware analysis
title_sub leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis
topic Computer networks Security measures
Information technology Automation
Information technology Management
topic_facet Computer networks Security measures
Information technology Automation
Information technology Management
url http://proquest.tech.safaribooksonline.de/9781788394512
work_keys_str_mv AT akulamadhu securityautomationwithansible2leverageansible2toautomatecomplexsecuritytaskslikeapplicationsecuritynetworksecurityandmalwareanalysis
AT mahajanakash securityautomationwithansible2leverageansible2toautomatecomplexsecuritytaskslikeapplicationsecuritynetworksecurityandmalwareanalysis