Citrix access security for IT administrators
Material type:
TextPublication details: New York, NY : McGraw-Hill, c2007.Edition: 1st edDescription: xvii, 268 p. : ill. ; 24 cmISBN: - 0071485430
- 9780071485432
- 005.8 22 C
- QA76.9.C55 C5357 2007
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14620 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14621 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14622 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14623 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14624 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14625 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14626 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14627 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14628 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14612 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14613 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14614 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14615 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14616 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14617 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14618 | ||||||||||||||
Books
|
Centeral Library Second Floor - Computer Sciences | 005.8 C 2007 (Browse shelf(Opens below)) | Available | 14619 |
Chapter 1. Introduction
Chapter 2. Secure Deployments
Chapter 3. Administrative Best Practices
Chapter 4. Secure Gateway
Chapter 5. Web Interface
Chapter 6. Password Manager
Chapter 7. Presentation Server
Chapter 8. Presentation Server Client
Chapter 9. License Server
There are no comments on this title.
