|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn354465255 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090528s2007 maua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d VLB
|d OCLCQ
|d COCUF
|d UBY
|d E7B
|d B24X7
|d OCLCQ
|d COO
|d OCLCQ
|d TEFOD
|d OCLCQ
|d NLE
|d OCLCF
|d UAB
|d OCLCQ
|d WYU
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 233000250
|a 505075412
|a 647691323
|a 1044297640
|a 1056353780
|a 1060197695
|a 1064067268
|
020 |
|
|
|a 9780080556635
|q (electronic bk.)
|
020 |
|
|
|a 0080556639
|q (electronic bk.)
|
020 |
|
|
|z 9781597492003
|
020 |
|
|
|z 1597492000
|
029 |
1 |
|
|a AU@
|b 000051562826
|
029 |
1 |
|
|a AU@
|b 000053250172
|
029 |
1 |
|
|a AU@
|b 000071724910
|
029 |
1 |
|
|a DEBSZ
|b 355443570
|
029 |
1 |
|
|a HEBIS
|b 291513875
|
035 |
|
|
|a (OCoLC)354465255
|z (OCoLC)233000250
|z (OCoLC)505075412
|z (OCoLC)647691323
|z (OCoLC)1044297640
|z (OCoLC)1056353780
|z (OCoLC)1060197695
|z (OCoLC)1064067268
|
037 |
|
|
|a CL0500000039
|b Safari Books Online
|
037 |
|
|
|a 457FCF68-CE92-4795-AD75-5A5C974BB425
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.875.E87
|b J86 2007
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Juniper(r) Networks secure access SSL VPN configuration guide /
|c Neil R. Wyler, technical editor ; Trent Fausset [and others].
|
246 |
1 |
4 |
|a Juniper Networks secure access SSL VPN configuration guide
|
260 |
|
|
|a Burlington, Mass. :
|b Syngress,
|c ©2007.
|
300 |
|
|
|a 1 online resource (xxvi, 577 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Ch. 1. Defining a Firewall -- Ch. 2. Setup -- Ch. 3. Realms, Roles, and Resources -- Ch. 4. Authentication Servers -- Ch. 5. Secure Application Manager -- Ch. 6. Terminal Services and Citrix -- Ch. 7. Network Connect -- Ch. 8. Endpoint Security -- Ch. 9. Web/File/Telnet/SSH -- Ch. 10. Maintenance Section -- Ch. 11. System Section -- Ch. 12. Sign-in Policies -- Ch. 13. Logging -- Ch. 14. Enterprise Features.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
610 |
2 |
0 |
|a Juniper Networks, Inc.
|
610 |
2 |
7 |
|a Juniper Networks, Inc.
|2 blmlsh
|
610 |
2 |
7 |
|a Juniper Networks, Inc.
|2 fast
|
650 |
|
0 |
|a Extranets (Computer networks)
|x Security measures.
|
650 |
|
6 |
|a Extranets
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Extranets (Computer networks)
|x Security measures.
|2 blmlsh
|
700 |
1 |
|
|a Wyler, Neil R.
|
700 |
1 |
|
|a Fausset, Trent.
|
776 |
0 |
8 |
|i Print version:
|t Juniper(r) Networks secure access SSL VPN configuration guide.
|d Burlington, MA : Syngress, ©2007
|w (DLC) 2008270057
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597492003/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00025436
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10204208
|
994 |
|
|
|a 92
|b IZTAP
|