57 lines
2.1 KiB
BibTeX
57 lines
2.1 KiB
BibTeX
# Example Paper
|
|
# Note that authors are "and"-seperated. The comma is part of the name. Like in "Etienne, Leon".
|
|
# So if you have multiple authors, use "Peter and Werner and Mario and Johann"...
|
|
|
|
|
|
@misc{bib:ansible,
|
|
author = {{Red Hat, Inc.}},
|
|
howpublished = "\url{https://www.redhat.com/en/ansible-collaborative}",
|
|
title = {{ Ansible Collaborative - What is Ansible? }},
|
|
year = {2025},
|
|
note = {Zugriff: Januar 2025}
|
|
}
|
|
|
|
@misc{bib:ansible-docs-python-module,
|
|
author = {{Red Hat, Inc.}},
|
|
howpublished = "\url{https://cn-ansibledoc.readthedocs.io/zh-cn/latest/dev_guide/developing_modules_general.html}",
|
|
title = {{ Ansible module development: getting started }},
|
|
year = {2019},
|
|
note = {Zugriff: Januar 2025}
|
|
}
|
|
|
|
@misc{bib:1password-cli-caching,
|
|
author = {{1Password}},
|
|
howpublished = "\url{https://developer.1password.com/docs/cli/reference/#cache-item-and-vault-information}",
|
|
title = {{ Cache item and vault information }},
|
|
year = {2025},
|
|
note = {Zugriff: Februar 2025}
|
|
}
|
|
|
|
@misc{bib:1password-secrets-automation,
|
|
author = {{1Password}},
|
|
howpublished = "\url{https://developer.1password.com/docs/secrets-automation/}",
|
|
title = {{ 1Password Secrets Automation }},
|
|
year = {2025},
|
|
note = {Zugriff: Februar 2025}
|
|
}
|
|
|
|
@misc{bib:ansible-filter-plugins,
|
|
author = {{Red Hat, Inc.}},
|
|
howpublished = "\url{https://docs.ansible.com/ansible/latest/plugins/filter.html}",
|
|
title = {{ Filter plugins }},
|
|
year = {2025},
|
|
note = {Zugriff: Februar 2025}
|
|
}
|
|
|
|
@techreport{bib:BSI-TR-02102-1-2024,
|
|
author = {{ BSI }},
|
|
title = {Cryptographic Mechanisms: Recommendations and Key Lengths},
|
|
institution = {Federal Office for Information Security (BSI)},
|
|
type = {Technical Guideline TR-02102},
|
|
version = {2024-1},
|
|
number = {TR-02102-1},
|
|
date = {2024-02-02},
|
|
year = {2024},
|
|
note = {Provides an assessment of the security and long-term orientation for selected cryptographic mechanisms.},
|
|
}
|