Cargando…

Check Point NG VPN-1/Firewall-1 : advanced configuration and troubleshooting /

Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Noble, Jim
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2003.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBSCO_ocm52730276
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 030728s2003 maua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d BAKER  |d OCLCQ  |d TUU  |d OCLCQ  |d TNF  |d OCLCQ  |d OCLCF  |d OCLCO  |d NLGGC  |d OCLCQ  |d OPELS  |d B24X7  |d MERUC  |d CCO  |d E7B  |d NTG  |d WPG  |d REDDC  |d DKDLA  |d U5D  |d FVL  |d DEBSZ  |d OCLCQ  |d AZK  |d CNNLC  |d LOA  |d INTCL  |d AGLDB  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d WY@  |d U3W  |d OCLCA  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d VTS  |d NRAMU  |d INT  |d VT2  |d TOF  |d OCLCQ  |d COO  |d G3B  |d TKN  |d OCLCQ  |d LEAUB  |d OL$  |d INARC  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 62882563  |a 70742413  |a 162599080  |a 475474375  |a 559340796  |a 606021348  |a 646713808  |a 722153953  |a 728000578  |a 961564956  |a 961581190  |a 962641247  |a 962695580  |a 991938974  |a 1037433184  |a 1053033504 
020 |a 193226681X  |q (electronic bk.) 
020 |a 9781932266818  |q (electronic bk.) 
020 |a 9781931836975 
020 |a 1931836973 
029 1 |a AU@  |b 000053222964 
029 1 |a CHBIS  |b 005830124 
029 1 |a CHNEW  |b 001004581 
029 1 |a CHVBK  |b 168614030 
029 1 |a DEBBG  |b BV042307709 
029 1 |a DEBBG  |b BV043151180 
029 1 |a DEBSZ  |b 405314264 
029 1 |a DEBSZ  |b 422427748 
029 1 |a GBVCP  |b 801045673 
029 1 |a NZ1  |b 12019301 
029 1 |a NZ1  |b 15190389 
035 |a (OCoLC)52730276  |z (OCoLC)62882563  |z (OCoLC)70742413  |z (OCoLC)162599080  |z (OCoLC)475474375  |z (OCoLC)559340796  |z (OCoLC)606021348  |z (OCoLC)646713808  |z (OCoLC)722153953  |z (OCoLC)728000578  |z (OCoLC)961564956  |z (OCoLC)961581190  |z (OCoLC)962641247  |z (OCoLC)962695580  |z (OCoLC)991938974  |z (OCoLC)1037433184  |z (OCoLC)1053033504 
037 |a 100746:100752  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b N63 2003eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 21 
049 |a UAMI 
100 1 |a Noble, Jim. 
245 1 0 |a Check Point NG VPN-1/Firewall-1 :  |b advanced configuration and troubleshooting /  |c Jim Noble [and others]. 
260 |a Rockland, MA :  |b Syngress,  |c ©2003. 
300 |a 1 online resource (xxxi, 606 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a Includes index. 
588 0 |a Print version record. 
520 |a Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates. 
505 0 0 |g Machine generated contents note:  |g Ch. 1  |t enveloping paradigm --  |g Ch. 2  |t Inheriting security problems --  |g Ch. 3  |t Information security --  |g Ch. 4  |t Mitigating exposures --  |g Ch. 5  |t Monitoring software exposures --  |g Ch. 6  |t Taking a hard look at hardware --  |g Ch. 7  |t Authenticating people --  |g Ch. 8  |t Monitoring and detecting deviations --  |g Ch. 9  |t Notifying systems --  |g App.  |t A Terms in context --  |g App. B  |t Factoring by quadratic relationships : a construction. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security  |x Computer programs. 
650 0 |a Firewalls (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 6 |a Sécurité informatique  |x Logiciels. 
650 6 |a Coupe-feu (Sécurité informatique) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |x Logiciels. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |x Computer programs  |2 fast 
650 7 |a Computer security  |x Computer programs  |2 fast 
650 7 |a Firewalls (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Noble, Jim.  |t Check Point NG VPN-1/Firewall-1.  |d Rockland, MA : Syngress, ©2003  |z 1931836973  |w (OCoLC)51992799 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=85659  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00002826 
938 |a Baker & Taylor  |b BKTY  |c 49.95  |d 37.46  |i 193226681X  |n 0006078940  |s active 
938 |a EBSCOhost  |b EBSC  |n 85659 
938 |a Internet Archive  |b INAR  |n checkpointngvpn10000nobl 
994 |a 92  |b IZTAP