Configuring Juniper Networks NetScreen & SSG firewalls /:
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to a...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress Pub.,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran. |
Beschreibung: | Title from title screen. Includes index. |
Beschreibung: | 1 online resource (xiii, 743 pages) : illustrations |
ISBN: | 1597491187 9781597491181 9780080502847 0080502849 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183934836 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 071216s2007 maua o 001 0 eng d | ||
040 | |a NTG |b eng |e pn |c NTG |d N$T |d YDXCP |d SFB |d UBY |d IDEBK |d E7B |d NRU |d OCLCQ |d OCLCF |d NLGGC |d AU@ |d OCLCQ |d OPELS |d ZMC |d MERUC |d B24X7 |d DEBSZ |d COO |d OCLCQ |d LIV |d OCLCQ |d OCLCO |d D6H |d UAB |d OCLCQ |d VTS |d NLE |d UKMGB |d STF |d LEAUB |d JBG |d M8D |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d MHW |d OCLCO |d OCLCQ |d OCLCO |d SXB |d OCLCQ |d OCLCO | ||
015 | |a GBB6H3829 |2 bnb | ||
016 | 7 | |a 017581897 |2 Uk | |
019 | |a 85822865 |a 162131533 |a 191035122 |a 243563076 |a 437175194 |a 488133992 |a 505134597 |a 647637766 |a 765142756 |a 781007503 |a 1103258595 |a 1129349323 |a 1153040872 |a 1192333690 |a 1240527417 | ||
020 | |a 1597491187 | ||
020 | |a 9781597491181 | ||
020 | |a 9780080502847 |q (electronic bk.) | ||
020 | |a 0080502849 |q (electronic bk.) | ||
035 | |a (OCoLC)183934836 |z (OCoLC)85822865 |z (OCoLC)162131533 |z (OCoLC)191035122 |z (OCoLC)243563076 |z (OCoLC)437175194 |z (OCoLC)488133992 |z (OCoLC)505134597 |z (OCoLC)647637766 |z (OCoLC)765142756 |z (OCoLC)781007503 |z (OCoLC)1103258595 |z (OCoLC)1129349323 |z (OCoLC)1153040872 |z (OCoLC)1192333690 |z (OCoLC)1240527417 | ||
037 | |a 136470:136603 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.59 |b .C66 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Configuring Juniper Networks NetScreen & SSG firewalls / |c lead author and technical editor, Rob Cameron. |
260 | |a Rockland, Mass. : |b Syngress Pub., |c ©2007. | ||
300 | |a 1 online resource (xiii, 743 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Title from title screen. | ||
500 | |a Includes index. | ||
520 | |a Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran. | ||
505 | 0 | |a Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index. | |
610 | 2 | 0 | |a Juniper Networks, Inc. |0 http://id.loc.gov/authorities/names/n2002019718 |
610 | 2 | 7 | |a Juniper Networks, Inc. |2 fast |
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
700 | 1 | |a Cameron, Rob. |4 edt |1 https://id.oclc.org/worldcat/entity/E39PCjDVxCPddb4K8h88B6PHwd |0 http://id.loc.gov/authorities/names/no2004009997 | |
740 | 0 | |a ITPro. | |
776 | 0 | 8 | |i Print version: |a Cameron, Rob. |t Configuring Juniper Networks NetScreen & SSG firewalls. |d Rockland, MA : Syngress, ©2007 |z 1597491187 |z 9781597491181 |w (OCoLC)76970540 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=179011 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491181 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00016138 | ||
938 | |a ebrary |b EBRY |n ebr10153117 | ||
938 | |a EBSCOhost |b EBSC |n 179011 | ||
938 | |a YBP Library Services |b YANK |n 2613872 | ||
938 | |a YBP Library Services |b YANK |n 2532795 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183934836 |
---|---|
_version_ | 1816881658804043776 |
adam_text | |
any_adam_object | |
author2 | Cameron, Rob |
author2_role | edt |
author2_variant | r c rc |
author_GND | http://id.loc.gov/authorities/names/no2004009997 |
author_facet | Cameron, Rob |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .C66 2007eb |
callnumber-search | TK5105.59 .C66 2007eb |
callnumber-sort | TK 45105.59 C66 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index. |
ctrlnum | (OCoLC)183934836 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04595cam a2200673 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183934836</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">071216s2007 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NTG</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">NTG</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">SFB</subfield><subfield code="d">UBY</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">NRU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLGGC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">ZMC</subfield><subfield code="d">MERUC</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NLE</subfield><subfield code="d">UKMGB</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">JBG</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H3829</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017581897</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">85822865</subfield><subfield code="a">162131533</subfield><subfield code="a">191035122</subfield><subfield code="a">243563076</subfield><subfield code="a">437175194</subfield><subfield code="a">488133992</subfield><subfield code="a">505134597</subfield><subfield code="a">647637766</subfield><subfield code="a">765142756</subfield><subfield code="a">781007503</subfield><subfield code="a">1103258595</subfield><subfield code="a">1129349323</subfield><subfield code="a">1153040872</subfield><subfield code="a">1192333690</subfield><subfield code="a">1240527417</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491187</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491181</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080502847</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080502849</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183934836</subfield><subfield code="z">(OCoLC)85822865</subfield><subfield code="z">(OCoLC)162131533</subfield><subfield code="z">(OCoLC)191035122</subfield><subfield code="z">(OCoLC)243563076</subfield><subfield code="z">(OCoLC)437175194</subfield><subfield code="z">(OCoLC)488133992</subfield><subfield code="z">(OCoLC)505134597</subfield><subfield code="z">(OCoLC)647637766</subfield><subfield code="z">(OCoLC)765142756</subfield><subfield code="z">(OCoLC)781007503</subfield><subfield code="z">(OCoLC)1103258595</subfield><subfield code="z">(OCoLC)1129349323</subfield><subfield code="z">(OCoLC)1153040872</subfield><subfield code="z">(OCoLC)1192333690</subfield><subfield code="z">(OCoLC)1240527417</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">136470:136603</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.C66 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Configuring Juniper Networks NetScreen & SSG firewalls /</subfield><subfield code="c">lead author and technical editor, Rob Cameron.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 743 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from title screen.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">Juniper Networks, Inc.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2002019718</subfield></datafield><datafield tag="610" ind1="2" ind2="7"><subfield code="a">Juniper Networks, Inc.</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cameron, Rob.</subfield><subfield code="4">edt</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjDVxCPddb4K8h88B6PHwd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004009997</subfield></datafield><datafield tag="740" ind1="0" ind2=" "><subfield code="a">ITPro.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Cameron, Rob.</subfield><subfield code="t">Configuring Juniper Networks NetScreen & SSG firewalls.</subfield><subfield code="d">Rockland, MA : Syngress, ©2007</subfield><subfield code="z">1597491187</subfield><subfield code="z">9781597491181</subfield><subfield code="w">(OCoLC)76970540</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=179011</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491181</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00016138</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10153117</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">179011</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2613872</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2532795</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn183934836 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
isbn | 1597491187 9781597491181 9780080502847 0080502849 |
language | English |
oclc_num | 183934836 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xiii, 743 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Configuring Juniper Networks NetScreen & SSG firewalls / lead author and technical editor, Rob Cameron. Rockland, Mass. : Syngress Pub., ©2007. 1 online resource (xiii, 743 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Title from title screen. Includes index. Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. .Configure Juniper's Instant Virtual Extran. Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index. Juniper Networks, Inc. http://id.loc.gov/authorities/names/n2002019718 Juniper Networks, Inc. fast Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast Cameron, Rob. edt https://id.oclc.org/worldcat/entity/E39PCjDVxCPddb4K8h88B6PHwd http://id.loc.gov/authorities/names/no2004009997 ITPro. Print version: Cameron, Rob. Configuring Juniper Networks NetScreen & SSG firewalls. Rockland, MA : Syngress, ©2007 1597491187 9781597491181 (OCoLC)76970540 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=179011 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491181 Volltext |
spellingShingle | Configuring Juniper Networks NetScreen & SSG firewalls / Cover; Contents; Foreword; Chapter 1: Networking, Security, and the Firewall; Chapter 2: Dissecting the Juniper Firewall; Chapter 3: Deploying Juniper Firewalls; Chapter 4: Policy Configuration; Chapter 5: Advanced Policy Configuration; Chapter 6: User Authentication; Chapter 7: Routing; Chapter 8: Address Translation; Chapter 9: Transparent Mode; Chapter 10: Attack Detection and Defense; Chapter 11: VPN Theory and Usage; Chapter 12: High Availability; Chapter 13: Troubleshooting the Juniper Firewall; Chapter 14: Virtual Systems; Index. Juniper Networks, Inc. http://id.loc.gov/authorities/names/n2002019718 Juniper Networks, Inc. fast Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2002019718 http://id.loc.gov/authorities/subjects/sh00006011 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Configuring Juniper Networks NetScreen & SSG firewalls / |
title_alt | ITPro. |
title_auth | Configuring Juniper Networks NetScreen & SSG firewalls / |
title_exact_search | Configuring Juniper Networks NetScreen & SSG firewalls / |
title_full | Configuring Juniper Networks NetScreen & SSG firewalls / lead author and technical editor, Rob Cameron. |
title_fullStr | Configuring Juniper Networks NetScreen & SSG firewalls / lead author and technical editor, Rob Cameron. |
title_full_unstemmed | Configuring Juniper Networks NetScreen & SSG firewalls / lead author and technical editor, Rob Cameron. |
title_short | Configuring Juniper Networks NetScreen & SSG firewalls / |
title_sort | configuring juniper networks netscreen ssg firewalls |
topic | Juniper Networks, Inc. http://id.loc.gov/authorities/names/n2002019718 Juniper Networks, Inc. fast Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Firewalls (Computer security) fast |
topic_facet | Juniper Networks, Inc. Firewalls (Computer security) Computer networks Security measures. Coupe-feu (Sécurité informatique) Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=179011 https://www.sciencedirect.com/science/book/9781597491181 |
work_keys_str_mv | AT cameronrob configuringjunipernetworksnetscreenssgfirewalls |