Check Point NG VPN-1/Firewall-1: advanced configuration and troubleshooting
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
©2003
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates |
Beschreibung: | 1 Online-Ressource (xxxi, 606 pages) |
ISBN: | 1931836973 193226681X 9781931836975 9781932266818 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043151180 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2003 |||| o||u| ||||||eng d | ||
020 | |a 1931836973 |9 1-931836-97-3 | ||
020 | |a 193226681X |c electronic bk. |9 1-932266-81-X | ||
020 | |a 9781931836975 |9 978-1-931836-97-5 | ||
020 | |a 9781932266818 |c electronic bk. |9 978-1-932266-81-8 | ||
035 | |a (OCoLC)52730276 | ||
035 | |a (DE-599)BVBBV043151180 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Noble, Jim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Check Point NG VPN-1/Firewall-1 |b advanced configuration and troubleshooting |c Jim Noble [and others] |
264 | 1 | |a Rockland, MA |b Syngress |c ©2003 | |
300 | |a 1 Online-Ressource (xxxi, 606 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. | ||
500 | |a Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. | ||
500 | |a Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures / Computer programs |2 fast | |
650 | 7 | |a Computer security / Computer programs |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
650 | 4 | |a Computer security |x Computer programs | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Computer networks |x Security measures |x Computer programs | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028575371 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175611036434432 |
---|---|
any_adam_object | |
author | Noble, Jim |
author_facet | Noble, Jim |
author_role | aut |
author_sort | Noble, Jim |
author_variant | j n jn |
building | Verbundindex |
bvnumber | BV043151180 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)52730276 (DE-599)BVBBV043151180 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04496nmm a2200505zc 4500</leader><controlfield tag="001">BV043151180</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2003 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836973</subfield><subfield code="9">1-931836-97-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">193226681X</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-932266-81-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836975</subfield><subfield code="9">978-1-931836-97-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266818</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-932266-81-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)52730276</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043151180</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Noble, Jim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Check Point NG VPN-1/Firewall-1</subfield><subfield code="b">advanced configuration and troubleshooting</subfield><subfield code="c">Jim Noble [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">©2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxi, 606 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. </subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures / Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security / Computer programs</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028575371</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043151180 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:19:02Z |
institution | BVB |
isbn | 1931836973 193226681X 9781931836975 9781932266818 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028575371 |
oclc_num | 52730276 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxxi, 606 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Syngress |
record_format | marc |
spelling | Noble, Jim Verfasser aut Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting Jim Noble [and others] Rockland, MA Syngress ©2003 1 Online-Ressource (xxxi, 606 pages) txt rdacontent c rdamedia cr rdacarrier Includes index Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of-use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer security / Computer programs fast Firewalls (Computer security) fast Computer security Computer programs Firewalls (Computer security) Computer networks Security measures Computer programs http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659 Aggregator Volltext |
spellingShingle | Noble, Jim Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer security / Computer programs fast Firewalls (Computer security) fast Computer security Computer programs Firewalls (Computer security) Computer networks Security measures Computer programs |
title | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting |
title_auth | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting |
title_exact_search | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting |
title_full | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting Jim Noble [and others] |
title_fullStr | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting Jim Noble [and others] |
title_full_unstemmed | Check Point NG VPN-1/Firewall-1 advanced configuration and troubleshooting Jim Noble [and others] |
title_short | Check Point NG VPN-1/Firewall-1 |
title_sort | check point ng vpn 1 firewall 1 advanced configuration and troubleshooting |
title_sub | advanced configuration and troubleshooting |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures / Computer programs fast Computer security / Computer programs fast Firewalls (Computer security) fast Computer security Computer programs Firewalls (Computer security) Computer networks Security measures Computer programs |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures / Computer programs Computer security / Computer programs Firewalls (Computer security) Computer security Computer programs Computer networks Security measures Computer programs |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=85659 |
work_keys_str_mv | AT noblejim checkpointngvpn1firewall1advancedconfigurationandtroubleshooting |