Junos Security: A Guide to Junos for the SRX Services Gateways and Security Certification
By Rob Cameron, Brad Woodberg, Patricio Giecco and
()
Currently unavailable
Currently unavailable
About this ebook
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks.
Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat management, and WAN acceleration. Junos Security is a clear and detailed roadmap to the SRX platform. The author's newer book, Juniper SRX Series, covers the SRX devices themselves.
- Get up to speed on Juniper’s multi-function SRX platforms and SRX Junos software
- Explore case studies and troubleshooting tips from engineers with extensive SRX experience
- Become familiar with SRX security policy, Network Address Translation, and IPSec VPN configuration
- Learn about routing fundamentals and high availability with SRX platforms
- Discover what sets SRX apart from typical firewalls
- Understand the operating system that spans the entire Juniper Networks networking hardware portfolio
- Learn about the more commonly deployed branch series SRX as well as the large Data Center SRX firewalls
"I know these authors well. They are out there in the field applying the SRX's industry-leading network security to real world customers everyday. You could not learn from a more talented team of security engineers."
--Mark Bauhaus, EVP and General Manager, Juniper Networks
Rob Cameron
Rob Cameron (JNCIS-FWV, JNCIA-M, CCSP, CCSE+) is a Security Solutions Engineer for Juniper Networks. He currently works to design security solutions for Juniper Networks that are considered best practice designs. Rob specializes in network security architecture, firewall deployment, risk management, and high-availability designs. His background includes five years of security consulting for more than 300 customers. This is Rob’s second book; the previous one being Configuring NetScreen Firewalls (ISBN: 1-932266-39-9) published by Syngress Publishing in 2004.
Read more from Rob Cameron
Configuring Juniper Networks NetScreen and SSG Firewalls Rating: 0 out of 5 stars0 ratingsJuniper(r) Networks Secure Access SSL VPN Configuration Guide Rating: 5 out of 5 stars5/5Configuring NetScreen Firewalls Rating: 0 out of 5 stars0 ratings
Related to Junos Security
Related ebooks
Path Routing in Mesh Optical Networks Rating: 0 out of 5 stars0 ratingsThe Wireless Application Protocol (WAP): A Wiley Tech Brief Rating: 0 out of 5 stars0 ratingsWiMAX Evolution: Emerging Technologies and Applications Rating: 0 out of 5 stars0 ratingsArchitecting Enterprise Solutions: Patterns for High-Capability Internet-based Systems Rating: 2 out of 5 stars2/5J2EE Open Source Toolkit: Building an Enterprise Platform with Open Source Tools (Java Open Source Library) Rating: 0 out of 5 stars0 ratingsTopology Control in Wireless Ad Hoc and Sensor Networks Rating: 0 out of 5 stars0 ratingsLogic Design for Array-Based Circuits: A Structured Design Methodology Rating: 0 out of 5 stars0 ratingsParallel Computing Rating: 0 out of 5 stars0 ratingsPDA Robotics Rating: 0 out of 5 stars0 ratingsMobile Messaging Technologies and Services: SMS, EMS and MMS Rating: 5 out of 5 stars5/5Parlay / OSA: From Standards to Reality Rating: 0 out of 5 stars0 ratingsWireless Mesh Networks Rating: 0 out of 5 stars0 ratingsEleventh Hour Network+: Exam N10-004 Study Guide Rating: 0 out of 5 stars0 ratingsOracle Database 10g RMAN Backup & Recovery Rating: 5 out of 5 stars5/5Video and Multimedia Transmissions over Cellular Networks: Analysis, Modelling and Optimization in Live 3G Mobile Communications Rating: 0 out of 5 stars0 ratingsBroadband Wireless Communications Business: An Introduction to the Costs and Benefits of New Technologies Rating: 0 out of 5 stars0 ratingsComputer Jargon Explained Rating: 0 out of 5 stars0 ratingsDeploying QoS for Cisco IP and Next Generation Networks: The Definitive Guide Rating: 5 out of 5 stars5/5Grid Computing: The Savvy Manager's Guide Rating: 0 out of 5 stars0 ratingsPalm Enterprise Applications: A Wiley Tech Brief Rating: 0 out of 5 stars0 ratingsMoving To The Cloud: Developing Apps in the New World of Cloud Computing Rating: 3 out of 5 stars3/5Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation Rating: 0 out of 5 stars0 ratingsWAP Servlets: Professional Developer's Guide Rating: 4 out of 5 stars4/5Secure Roaming in 802.11 Networks Rating: 4 out of 5 stars4/5Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices Rating: 5 out of 5 stars5/5Microprocessor Based Systems for the Higher Technician Rating: 0 out of 5 stars0 ratingsBridge Technology Report Rating: 0 out of 5 stars0 ratingsWireless Sensor and Actuator Networks: Technologies, Analysis and Design Rating: 0 out of 5 stars0 ratingsMicrosoft SQL Server 2005: A Beginner''s Guide Rating: 0 out of 5 stars0 ratingsTelecommunications: Present Status and Future Trends Rating: 5 out of 5 stars5/5
Security For You
Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Hacking For Dummies Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsWireless Hacking 101 Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2E Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsCompTIA CySA+ Study Guide: Exam CS0-003 Rating: 0 out of 5 stars0 ratingsMike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Measure Anything in Cybersecurity Risk Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for Junos Security
0 ratings0 reviews