It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_nuls

Record ID marc_nuls/NULS_PHC_180925.mrc:173301479:1754
Source marc_nuls
Download Link /show-records/marc_nuls/NULS_PHC_180925.mrc:173301479:1754?format=raw

LEADER: 01754nam 2200361Ka 4500
001 9919378470001661
005 20150423120029.0
008 061214s2007 maua 001 0 eng d
020 $a1597491187
020 $a9781597491181
029 1 $aYDXCP$b2495132
035 $a(CSdNU)u300162-01national_inst
035 $a(OCoLC)76970540
035 $a(OCoLC)76970540
035 $a(OCoLC)76970540
040 $aVYR$cVYR$dYDXCP$dBAKER$dOrLoB-B
049 $aCNUM
090 $aTK5105.59$b.C354 2007
100 1 $aCameron, Rob.
245 10 $aConfiguring Juniper Networks NetScreen & SSG firewalls /$cRob Cameron...[et al.].
260 $aRockland, MA :$bSyngress,$cc2007.
300 $axiii, 743 p. :$bill. ;$c24 cm.
504 $aIncludes index.
505 0 $aCh. 1. Networking, security, and the firewall -- Ch. 2. Dissecting the juniper firewall -- Ch. 3. Deploying juniper firewalls -- Ch. 4. Policy configuration -- Ch. 5. Advanced policy configuration -- Ch. 6. User authentication -- Ch. 7. Routing -- Ch. 8. Address translation -- Ch. 9. Transparent mode -- Ch. 10. Attack detection and defense -- Ch. 11. VPN theory and usage -- Ch. 12. High availability -- Ch. 13. Troubleshooting the Juniper firewall -- Ch. 14. Virtual systems.
650 0 $aComputer networks$xSecurity measures.
650 0 $aFirewalls (Computer security)
710 2 $aJuniper Networks, Inc.
938 $aYBP Library Services$bYANK$n2495132
938 $aBaker & Taylor$bBKTY$c49.95$d37.46$i1597491187$n0006887489$sactive
947 $fSOET-TEC$hCIRCSTACKS$p$47.45$q1
949 $aTK 5105.59 .C354 2007$i31786102177422
994 $a92$bCNU
999 $aTK 5105.59 .C354 2007$wLC$c1$i31786102177422$d5/31/2009$e5/7/2009 $lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u6/26/2007