Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Juniper(r) Networks Secure Access SSL VPN Configuration Guide

Buy
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.

* Complete coverage of the Juniper Networks Secure Access SSL VPN line including the 700, 2000, 4000, 6000, and 6000 SP.
* Learn to scale your appliances to meet the demands of remote workers and offices.
* Use the NEW coordinated threat control with Juniper Networks IDP to manage the security of your entire enterprise.

About the Author

Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Robs second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004. Neil R. Wyler (JNCIS-FWV, JNCIA-SSL) is an Information Security Engineer and Researcher located on the Wasatch Front in Utah. He is the co-owner of two Utah-based businesses, which include a consulting firm with clients worldwide and a small software start-up. He is currently doing contract work for Juniper Networks, working with the companys Security Products Group. Neil is a staff member of the Black Hat Security Briefings and Def Con hacker conference. He has spoken at numerous security conferences and been the subject of various online, print, film, and television interviews regarding different areas of information security. He was the Lead Author and Technical Editor of Aggressive Network Self-Defense (Syngress, 1-931836-20-5) and serves on the advisory board for a local technical college.
(HTML tags aren't allowed.)

CMMI for Services: Guidelines for Superior Service (2nd Edition) (SEI Series in Software Engineering)
CMMI for Services: Guidelines for Superior Service (2nd Edition) (SEI Series in Software Engineering)

CMMI® for Services (CMMI-SVC) is a comprehensive set of guidelines to help organizations establish and improve processes for delivering services. By adapting and extending proven standards and best practices to reflect the unique challenges faced in service industries, CMMI-SVC offers providers a practical and focused...

Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

3D Printing with SketchUp
3D Printing with SketchUp

Real-world case studies to help you design models in SketchUp for 3D printing on anything ranging from the smallest desktop machines to the largest industrial 3D printers

Overview

  • Learn how to design beautiful architectural models that will print on any 3D printer
  • Packed with clearly...

Haskell: The Craft of Functional Programming (2nd Edition)
Haskell: The Craft of Functional Programming (2nd Edition)
The second edition of Haskell: The Craft of Functional Programming is essential reading for beginners to functional programming and newcomers to the Haskell programming language. The emphasis is on the process of crafting programs and the text contains many examples and running case studies, as well as advice an program design, testing, problem...
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company
The Google Resume: How to Prepare for a Career and Land a Job at Apple, Microsoft, Google, or any Top Tech Company

Just so you’re clear: it was not my idea to give a talk to Microsoft Research. I had learned embarrassingly little about computer science in my 18 years of life, and the last thing I wanted to do is to have that exposed in front of a bunch of genius PhDs in MSR. But my manager thought it’d be a great...

XML and SQL: Developing Web Applications
XML and SQL: Developing Web Applications

XML and SQL: Developing Web Applications is a guide for Web developers and database programmers interested in building robust XML applications backed by SQL databases. It makes it easier than ever for Web developers to create and manage scalable database applications optimized for the Internet.

The author...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy