|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn162131611 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
070802s2007 ne o 000 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OPELS
|d OCLCQ
|d DKDLA
|d OCLCQ
|d OCLCF
|d OCLCQ
|d D6H
|d LEAUB
|d OL$
|d OCLCQ
|
019 |
|
|
|a 488134735
|
020 |
|
|
|a 9781597492003
|
020 |
|
|
|a 1597492000
|
029 |
1 |
|
|a AU@
|b 000057223710
|
029 |
1 |
|
|a CHBIS
|b 005829165
|
029 |
1 |
|
|a CHNEW
|b 001006109
|
029 |
1 |
|
|a CHVBK
|b 168504677
|
029 |
1 |
|
|a DEBBG
|b BV039828882
|
029 |
1 |
|
|a DEBBG
|b BV042314194
|
029 |
1 |
|
|a DEBSZ
|b 405306075
|
029 |
1 |
|
|a NZ1
|b 11778395
|
029 |
1 |
|
|a NZ1
|b 15189243
|
035 |
|
|
|a (OCoLC)162131611
|z (OCoLC)488134735
|
037 |
|
|
|a 141250:141393
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a TK5105.875.E87
|b C36 2007
|
082 |
0 |
4 |
|a 004.6
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Cameron, Rob.
|
245 |
1 |
0 |
|a Juniper(r) networks secure access ssl vpn configuration guide.
|
260 |
|
|
|a Amsterdam :
|b Elsevier,
|c 2007.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform. * Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP. * Learn to scale your appliances to meet the demands of remote workers and offices. * Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.
|
505 |
0 |
|
|a Introduction -- Roles -- Setup -- Authentication Servers -- Realms -- Secure Application Manager/Terminal Services -- Network Connect -- Endpoint Security -- Web/File Access/Telnet/SSH -- Clustering -- Virtual Systems -- Troubleshooting.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Extranets (Computer networks)
|
650 |
|
7 |
|a Extranets (Computer networks)
|2 fast
|0 (OCoLC)fst00919023
|
776 |
0 |
8 |
|i Print version:
|a Cameron, Rob.
|t Juniper(r) networks secure access ssl vpn configuration guide.
|d Amsterdam : Elsevier, 2007
|z 1597492000
|z 9781597492003
|w (OCoLC)141386434
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214749
|z Texto completo
|
994 |
|
|
|a 92
|b IZTAP
|