{"title":"Case Studies","authors":"Rithik Chatterjee","doi":"10.1007/978-1-4842-6434-8_7","DOIUrl":"https://doi.org/10.1007/978-1-4842-6434-8_7","url":null,"abstract":"","PeriodicalId":112220,"journal":{"name":"Red Hat and IT Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127390852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction to IT Security","authors":"Rithik Chatterjee","doi":"10.1007/978-1-4842-6434-8_1","DOIUrl":"https://doi.org/10.1007/978-1-4842-6434-8_1","url":null,"abstract":"","PeriodicalId":112220,"journal":{"name":"Red Hat and IT Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129407270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Red Hat Hyperconverged Infrastructure","authors":"Rithik Chatterjee","doi":"10.1007/978-1-4842-6434-8_4","DOIUrl":"https://doi.org/10.1007/978-1-4842-6434-8_4","url":null,"abstract":"","PeriodicalId":112220,"journal":{"name":"Red Hat and IT Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115281033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing","authors":"Rithik Chatterjee","doi":"10.1007/978-1-4842-6434-8","DOIUrl":"https://doi.org/10.1007/978-1-4842-6434-8","url":null,"abstract":"","PeriodicalId":112220,"journal":{"name":"Red Hat and IT Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114327526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}