Published by Elsevier Science & Technology Books, 2006
ISBN 10: 1597491187 ISBN 13: 9781597491181
Language: English
Seller: Better World Books Ltd, Dunfermline, United Kingdom
Condition: Good. Ships from the UK. Used book that is in clean, average condition without any missing pages.
Published by Elsevier Science & Technology Books, 2006
ISBN 10: 1597491187 ISBN 13: 9781597491181
Language: English
Seller: Better World Books, Mishawaka, IN, U.S.A.
£ 5.44
Convert currencyQuantity: 1 available
Add to basketCondition: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
£ 6.44
Convert currencyQuantity: 1 available
Add to basketSoftcover. Condition: Très bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Edition 2007. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Former library book. Slight signs of wear on the cover. Edition 2007. Ammareal gives back up to 15% of this item's net price to charity organizations.
Seller: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
£ 4.92
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.2.
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
£ 4.92
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 2.2.
£ 4.93
Convert currencyQuantity: 1 available
Add to basketCondition: Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Seller: Chiron Media, Wallingford, United Kingdom
£ 32.56
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 35.05
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 1077.
Seller: Revaluation Books, Exeter, United Kingdom
Paperback. Condition: Brand New. 1st edition. 512 pages. 9.00x7.00x2.00 inches. In Stock.
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. pp. 512.
£ 44.43
Convert currencyQuantity: 3 available
Add to basketCondition: New. pp. 512 1st Edition.
Seller: Biblios, Frankfurt am main, HESSE, Germany
£ 56.22
Convert currencyQuantity: 3 available
Add to basketCondition: New. pp. 512.
Seller: Cronus Books, Carson City, NV, U.S.A.
£ 49.06
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: As New. Like New Inside and Outside. Clean and crisp pages w/no markings! You will be pleased. Excellent book! ( z1s211D ) Some very minor wear on cover and page edges. ** Fast Shipping**.
Seller: BennettBooksLtd, North Las Vegas, NV, U.S.A.
£ 60.47
Convert currencyQuantity: 1 available
Add to basketPaperback. Condition: New. In shrink wrap. Looks like an interesting title!
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
£ 35.54
Convert currencyQuantity: Over 20 available
Add to basketCondition: new. Questo è un articolo print on demand.
Published by Elsevier Science Jan 2007, 2007
ISBN 10: 1597491187 ISBN 13: 9781597491181
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
£ 45.38
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. Configure Juniper's Instant Virtual Extranet (IVE) Install and set up IVE through either the command line interface (CLI) or Web-based console Master the '3 Rs': Realms, Roles, and Resources Realize the potential of the '3Rs' for endpoint security, sign-in policies, and authorization of servers Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field Integrate IVE with Terminal Services and Citrix Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet Ensure Endpoint Security Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network Manage the Remote Access Needs of Your Organization Configure Web access, file access and telnet/SSH access for remote users and offices Configure Core Networking Components through the System Menu Create clusters, manage virtual systems, and monitor logs, reports, and alerts Create Bullet-Proof Sign-in Policies Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages Use the IVE for Log-Related Tasks Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting. 768 pp. Englisch.
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 51.56
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform. Configure Juniper's Instant Virtual Extranet (IVE) Install and set up IVE through either the command line interface (CLI) or Web-based console Master the '3 Rs': Realms, Roles, and Resources Realize the potential of the '3Rs' for endpoint security, sign-in policies, and authorization of servers Get Inside both the Windows and Java Versions of Secure Application Manager (SAM) Learn to implement SAM, manage the end-user experience, and troubleshoot SAM in the field Integrate IVE with Terminal Services and Citrix Enable terminal services proxy and configure role options, configure Citrix using a custom ICA, configure terminal services resource policies and profiles, and configure terminal services and Citrix using a hosted Java applet Ensure Endpoint Security Use Host Checker, Cache Cleaner, Secure Virtual Workspace, and IVE/IDP integration to secure your network Manage the Remote Access Needs of Your Organization Configure Web access, file access and telnet/SSH access for remote users and offices Configure Core Networking Components through the System Menu Create clusters, manage virtual systems, and monitor logs, reports, and alerts Create Bullet-Proof Sign-in Policies Create standard and custom sign-in pages for both user and administrator access and Secure Meeting pages Use the IVE for Log-Related Tasks Perform log filtering, log management, syslog exporting, SNMP management, and system resource monitoring and reporting.
Published by Syngress Media|Syngress, 2007
ISBN 10: 1597491187 ISBN 13: 9781597491181
Language: English
Seller: moluna, Greven, Germany
£ 44.89
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide helps system administrators and security profession.