LEADER 00956nam--2200337---450- 001 990002251150203316 005 20090305100428.0 035 $a000225115 035 $aUSA01000225115 035 $a(ALEPH)000225115USA01 035 $a000225115 100 $a20041209d1970----km-y0itay0103----ba 101 $afre 102 $aFR 105 $a||||||||001yy 200 1 $a<> economiestes sovietiques et europeennes$fMarie Lavigne 210 $aParis$cA.Colin$d1970 215 $a511 p.$d22 cm 410 0$12001 454 1$12001 461 1$1001-------$12001 700 1$aLAVIGNE,$bMarie$089198 801 0$aIT$bsalbc$gISBD 912 $a990002251150203316 951 $a335 LAV 1 (iep VIII 323)$b(11237 E.C.)$ciep VIII$d00199011 959 $aBK 969 $aECO 979 $aSIAV1$b10$c20041209$lUSA01$h1242 979 $aRSIAV5$b90$c20090305$lUSA01$h1004 996 $aEconomiestes sovietiques et europeennes$91034297 997 $aUNISA LEADER 02014oam 2200457Ia 450 001 9910696343503321 005 20220715132646.0 035 $a(CKB)5470000002377397 035 $a(OCoLC)190858830 035 $a(EXLCZ)995470000002377397 100 $a20080117d2007 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aField-based evaluations of sampling techniques to support long-term monitoring of riparian ecosystems along wadeable streams on the Colorado Plateau$b[electronic resource] /$fMichael L. Scott and Elizabeth W. Reynolds ; prepared in cooperation with the Northern and Southern Colorado Plateau Park Networks 210 1$aReston, Va. :$cU.S. Geological Survey,$d2007. 215 $aiv, 57 pages $cdigital, PDF file 225 1 $aOpen-file report ;$v2007-1266 300 $aTitle from PDF title screen (viewed on Jan. 16, 2008). 320 $aIncludes bibliographical references. 606 $aEnvironmental monitoring$zColorado Plateau 606 $aEnvironmental monitoring$zColorado Plateau$xMethodology$xEvaluation 606 $aRiparian ecology$xSampling$zColorado Plateau 606 $aRiparian ecology$xSampling$zColorado Plateau$xMethodology$xEvaluation 615 0$aEnvironmental monitoring 615 0$aEnvironmental monitoring$xMethodology$xEvaluation. 615 0$aRiparian ecology$xSampling 615 0$aRiparian ecology$xSampling$xMethodology$xEvaluation. 700 $aScott$b Michael L$0149864 701 $aReynolds$b Elizabeth W$01409938 712 02$aNorthern and Southern Colorado Plateau Park Networks. 712 02$aGeological Survey (U.S.) 801 0$bGIS 801 1$bGIS 801 2$bGPO 906 $aBOOK 912 $a9910696343503321 996 $aField-based evaluations of sampling techniques to support long-term monitoring of riparian ecosystems along wadeable streams on the Colorado Plateau$93497641 997 $aUNINA LEADER 04555nam 2200421 450 001 9910808854503321 005 20231002165645.0 010 $a1-78913-115-4 035 $a(CKB)4100000007748356 035 $a(MiAaPQ)EBC5721143 035 $a(CaSebORM)9781789132304 035 $a(PPN)236070193 035 $a(EXLCZ)994100000007748356 100 $a20190322d2019 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aMastering identity and access management with Microsoft Azure $eempower users by managing and protecting identities and data /$fJochen Nickel 205 $aSecond edition. 210 1$aBirmingham, England ;$aMumbai :$cPackt,$d2019. 215 $a1 online resource (681 pages) 300 $aIncludes index. 311 0 $a1-78913-230-4 327 $aChapter 1: Building and Managing Azure Active Directory -- Chapter 2: Understanding Identity Synchronization -- Chapter 3: Exploring Advanced Synchronization Concepts -- Chapter 4: Monitoring Your Identity Bridge -- Chapter 5: Configuring and Managing Identity Protection -- Chapter 6: Managing Authentication Protocols -- Chapter 7: Deploying Solutions on Azure AD and ADFS -- Chapter 8: Using the Azure AD App Proxy and the Web Application Proxy -- Chapter 9: Deploying Additional Applications on Azure AD -- Chapter 10: Exploring Azure AD Identity Services -- Chapter 11: Creating Identity Life Cycle Management in Azure -- Chapter 12: Creating a Security Culture -- Chapter 13: Identifying and Detecting Sensitive Data -- Chapter 14: Understanding Encryption Key Management Strategies -- Chapter 15: Configuring Azure Information Protection Solutions -- Chapter 16: Azure Information Protection Development. 330 $a"Start empowering users and protecting corporate data, while managing identities and access with Microsoft Azure in different environments Key Features Understand how to identify and manage business drivers during transitions Explore Microsoft Identity and Access Management as a Service (IDaaS) solution Over 40 playbooks to support your learning process with practical guidelines Book Description Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You'll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies. What you will learn Apply technical descriptions to your business needs and deployments Manage cloud-only, simple, and complex hybrid environments Apply correct and efficient monitoring and identity protection strategies Design and deploy custom Identity and access management solutions Build a complete identity and access management life cycle Understand authentication and application publishing mechanisms Use and understand the most crucial identity synchronization scenarios Implement a suitable information protection strategy Who this book is for This book is a perfect companion for developers, cyber security specialists, system and security engineers, IT consultants/architects, and system administrators who are looking for perfectly up?to-date hybrid and cloud-only scenarios. You should have some understanding of security solutions, Active Directory, access privileges/rights, and authentication methods. Programming knowledge is not required but can be helpful for using PowerShell or working with APIs to customize your solutions." -- Publisher's description. 606 $aCloud computing$xData processing 615 0$aCloud computing$xData processing. 676 $a004.6782 700 $aNickel$b Jochen$01623055 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910808854503321 996 $aMastering identity and access management with Microsoft Azure$94010204 997 $aUNINA