Configuring Juniper Networks NetScreen & SSG firewalls:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass.
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from title screen. - Includes index Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index |
Beschreibung: | 1 Online-Ressource (xiii, 743 p.) |
ISBN: | 0080502849 1597491187 9780080502847 9781597491181 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043077653 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080502849 |c electronic bk. |9 0-08-050284-9 | ||
020 | |a 1597491187 |9 1-59749-118-7 | ||
020 | |a 9780080502847 |c electronic bk. |9 978-0-08-050284-7 | ||
020 | |a 9781597491181 |9 978-1-59749-118-1 | ||
035 | |a (OCoLC)183934836 | ||
035 | |a (DE-599)BVBBV043077653 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Configuring Juniper Networks NetScreen & SSG firewalls |c lead author and technical editor, Rob Cameron |
246 | 1 | 3 | |a ITPro |
264 | 1 | |a Rockland, Mass. |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xiii, 743 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from title screen. - Includes index | ||
500 | |a Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran | ||
500 | |a Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index | ||
610 | 1 | 7 | |a Juniper Networks, Inc |2 fast |
610 | 1 | 4 | |a Juniper Networks, Inc |
610 | 2 | 4 | |a Juniper Networks, Inc |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Programm |0 (DE-588)4047394-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Firewall |0 (DE-588)4386332-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Firewall |0 (DE-588)4386332-2 |D s |
689 | 0 | 1 | |a Programm |0 (DE-588)4047394-6 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Cameron, Rob |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028501845 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175466704142336 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043077653 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183934836 (DE-599)BVBBV043077653 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03505nmm a2200589zc 4500</leader><controlfield tag="001">BV043077653</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080502849</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-050284-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491187</subfield><subfield code="9">1-59749-118-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502847</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-050284-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491181</subfield><subfield code="9">978-1-59749-118-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183934836</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043077653</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Configuring Juniper Networks NetScreen & SSG firewalls</subfield><subfield code="c">lead author and technical editor, Rob Cameron</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">ITPro</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 743 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index</subfield></datafield><datafield tag="610" ind1="1" ind2="7"><subfield code="a">Juniper Networks, Inc</subfield><subfield code="2">fast</subfield></datafield><datafield tag="610" ind1="1" ind2="4"><subfield code="a">Juniper Networks, Inc</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">Juniper Networks, Inc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Firewall</subfield><subfield code="0">(DE-588)4386332-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cameron, Rob</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028501845</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043077653 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:44Z |
institution | BVB |
isbn | 0080502849 1597491187 9780080502847 9781597491181 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028501845 |
oclc_num | 183934836 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiii, 743 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Configuring Juniper Networks NetScreen & SSG firewalls lead author and technical editor, Rob Cameron ITPro Rockland, Mass. Syngress Pub. c2007 1 Online-Ressource (xiii, 743 p.) txt rdacontent c rdamedia cr rdacarrier Title from title screen. - Includes index Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index Juniper Networks, Inc fast Juniper Networks, Inc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Programm (DE-588)4047394-6 gnd rswk-swf Firewall (DE-588)4386332-2 gnd rswk-swf Firewall (DE-588)4386332-2 s Programm (DE-588)4047394-6 s 1\p DE-604 Cameron, Rob Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Configuring Juniper Networks NetScreen & SSG firewalls Juniper Networks, Inc fast Juniper Networks, Inc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Programm (DE-588)4047394-6 gnd Firewall (DE-588)4386332-2 gnd |
subject_GND | (DE-588)4047394-6 (DE-588)4386332-2 |
title | Configuring Juniper Networks NetScreen & SSG firewalls |
title_alt | ITPro |
title_auth | Configuring Juniper Networks NetScreen & SSG firewalls |
title_exact_search | Configuring Juniper Networks NetScreen & SSG firewalls |
title_full | Configuring Juniper Networks NetScreen & SSG firewalls lead author and technical editor, Rob Cameron |
title_fullStr | Configuring Juniper Networks NetScreen & SSG firewalls lead author and technical editor, Rob Cameron |
title_full_unstemmed | Configuring Juniper Networks NetScreen & SSG firewalls lead author and technical editor, Rob Cameron |
title_short | Configuring Juniper Networks NetScreen & SSG firewalls |
title_sort | configuring juniper networks netscreen ssg firewalls |
topic | Juniper Networks, Inc fast Juniper Networks, Inc COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Firewalls (Computer security) fast Firewalls (Computer security) Computer networks Security measures Programm (DE-588)4047394-6 gnd Firewall (DE-588)4386332-2 gnd |
topic_facet | Juniper Networks, Inc COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Firewalls (Computer security) Computer networks Security measures Programm Firewall |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=179011 |
work_keys_str_mv | AT cameronrob configuringjunipernetworksnetscreenssgfirewalls AT cameronrob itpro |