Configuring Check Point NGX VPN-1/FireWall-1 /:
Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the su...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. |
Beschreibung: | 1 online resource (xxx, 625) : illustrations |
ISBN: | 1423754298 9781423754299 0080488560 9780080488561 9781597490313 1597490318 1281035572 9781281035578 9786611035570 6611035575 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm64187875 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 060221s2005 maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d OCLCQ |d Y8N |d N15 |d E7B |d IDEBK |d NTG |d UMI |d CEF |d DKDLA |d ZCU |d NHM |d DEBSZ |d MERUC |d B24X7 |d OCLCF |d OCLCQ |d COO |d OCLCQ |d CDN |d BDX |d AZK |d TXI |d LOA |d COCUF |d AGLDB |d CNNOR |d MOR |d PIFBR |d LIV |d OCLCQ |d OCLCO |d WY@ |d U3W |d LUE |d STF |d BRL |d WRM |d VTS |d NRAMU |d EZ9 |d MOQ |d INT |d VT2 |d OCLCQ |d OCLCO |d A6Q |d G3B |d OCLCQ |d UAB |d M8D |d VLY |d UKCRE |d BRF |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
019 | |a 70835645 |a 84375330 |a 181421097 |a 319430932 |a 473077337 |a 475327153 |a 506996807 |a 593862179 |a 647464655 |a 722429452 |a 765142604 |a 961586336 |a 962649502 |a 966209827 |a 988513223 |a 991937741 |a 1035649685 |a 1037507205 |a 1038624702 |a 1044332891 |a 1045536321 |a 1049065933 |a 1055351608 |a 1056375731 |a 1060197007 |a 1073065287 |a 1081252093 |a 1103262209 |a 1129365695 |a 1152996875 |a 1162219316 |a 1179544696 |a 1192338936 | ||
020 | |a 1423754298 |q (electronic bk.) | ||
020 | |a 9781423754299 |q (electronic bk.) | ||
020 | |a 0080488560 | ||
020 | |a 9780080488561 | ||
020 | |a 9781597490313 | ||
020 | |a 1597490318 | ||
020 | |a 1281035572 | ||
020 | |a 9781281035578 | ||
020 | |a 9786611035570 | ||
020 | |a 6611035575 | ||
024 | 1 | |a 792502903186 | |
035 | |a (OCoLC)64187875 |z (OCoLC)70835645 |z (OCoLC)84375330 |z (OCoLC)181421097 |z (OCoLC)319430932 |z (OCoLC)473077337 |z (OCoLC)475327153 |z (OCoLC)506996807 |z (OCoLC)593862179 |z (OCoLC)647464655 |z (OCoLC)722429452 |z (OCoLC)765142604 |z (OCoLC)961586336 |z (OCoLC)962649502 |z (OCoLC)966209827 |z (OCoLC)988513223 |z (OCoLC)991937741 |z (OCoLC)1035649685 |z (OCoLC)1037507205 |z (OCoLC)1038624702 |z (OCoLC)1044332891 |z (OCoLC)1045536321 |z (OCoLC)1049065933 |z (OCoLC)1055351608 |z (OCoLC)1056375731 |z (OCoLC)1060197007 |z (OCoLC)1073065287 |z (OCoLC)1081252093 |z (OCoLC)1103262209 |z (OCoLC)1129365695 |z (OCoLC)1152996875 |z (OCoLC)1162219316 |z (OCoLC)1179544696 |z (OCoLC)1192338936 | ||
037 | |a CL0500000038 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .S846 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Stephens, Robert |c (Information security consultant) |1 https://id.oclc.org/worldcat/entity/E39PCjwywVXhhmfmWtVd9xKq33 |0 http://id.loc.gov/authorities/names/no2016154994 | |
245 | 1 | 0 | |a Configuring Check Point NGX VPN-1/FireWall-1 / |c Robert Stephens, Barry J. Stiefel, Stephen Watkins. |
246 | 3 | 0 | |a Check Point NGX |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2005. | ||
300 | |a 1 online resource (xxx, 625) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a 1. Introduction to firewalls and VPN-1/FireWall-1 -- 2. What's new in NGX -- 3. Installing check point NGX -- 4. Upgrading to NGX -- 5. SmartDashboard and SmartPortal -- 6. SmartView tracker -- 7. SmartDefense and Web intelligence -- 8. Network address translation -- 9. Authentication -- 10. Content security and OPSEC -- 11. VPN -- 12. SecuRemote, SecureClient, and Integrity -- 13. SmartUpdate -- 14. SecurePlatform -- 15. Monitoring tools -- 16. Enabling voice-over-IP traffic. | |
520 | |a Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. | ||
546 | |a English. | ||
630 | 0 | 7 | |a FireWall-1. |2 blmlsh |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Firewalls (Computer security) |0 http://id.loc.gov/authorities/subjects/sh00006011 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Coupe-feu (Sécurité informatique) | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Firewalls (Computer security) |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |x Computer programs. |2 blmlsh | |
650 | 7 | |a Computer security |x Computer programs. |2 blmlsh | |
650 | 7 | |a Extranets (Computer networks) |2 blmlsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Firewalls (Computer security) |2 fast | |
700 | 1 | |a Stiefel, Barry J. | |
700 | 1 | |a Watkins, Stephen |c (Information security professional) |1 https://id.oclc.org/worldcat/entity/E39PCjrGc8vjbVBywFWYHmvrFX |0 http://id.loc.gov/authorities/names/no2007041572 | |
758 | |i has work: |a Configuring Check Point NGX VPN-1/FireWall-1 (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGRRDv7H3vFqxkR49hRvgX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Stephens, Robert. |t Configuring Check Point NGX VPN-1/FireWall-1. |d Rockland, MA : Syngress Pub., ©2005 |z 1597490318 |w (OCoLC)62615252 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149584 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00005199 | ||
938 | |a Brodart |b BROD |n 04464052 |c $49.95 | ||
938 | |a ebrary |b EBRY |n ebr10110278 | ||
938 | |a EBSCOhost |b EBSC |n 149584 | ||
938 | |a Internet Archive |b INAR |n configuringcheck0000step | ||
938 | |a YBP Library Services |b YANK |n 2730610 | ||
938 | |a YBP Library Services |b YANK |n 2395153 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm64187875 |
---|---|
_version_ | 1816881633955938304 |
adam_text | |
any_adam_object | |
author | Stephens, Robert (Information security consultant) |
author2 | Stiefel, Barry J. Watkins, Stephen (Information security professional) |
author2_role | |
author2_variant | b j s bj bjs s w sw |
author_GND | http://id.loc.gov/authorities/names/no2016154994 http://id.loc.gov/authorities/names/no2007041572 |
author_facet | Stephens, Robert (Information security consultant) Stiefel, Barry J. Watkins, Stephen (Information security professional) |
author_role | |
author_sort | Stephens, Robert (Information security consultant) |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .S846 2005eb |
callnumber-search | TK5105.59 .S846 2005eb |
callnumber-sort | TK 45105.59 S846 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | 1. Introduction to firewalls and VPN-1/FireWall-1 -- 2. What's new in NGX -- 3. Installing check point NGX -- 4. Upgrading to NGX -- 5. SmartDashboard and SmartPortal -- 6. SmartView tracker -- 7. SmartDefense and Web intelligence -- 8. Network address translation -- 9. Authentication -- 10. Content security and OPSEC -- 11. VPN -- 12. SecuRemote, SecureClient, and Integrity -- 13. SmartUpdate -- 14. SecurePlatform -- 15. Monitoring tools -- 16. Enabling voice-over-IP traffic. |
ctrlnum | (OCoLC)64187875 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05685cam a2200829 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm64187875 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">060221s2005 maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">Y8N</subfield><subfield code="d">N15</subfield><subfield code="d">E7B</subfield><subfield code="d">IDEBK</subfield><subfield code="d">NTG</subfield><subfield code="d">UMI</subfield><subfield code="d">CEF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ZCU</subfield><subfield code="d">NHM</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">MERUC</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CDN</subfield><subfield code="d">BDX</subfield><subfield code="d">AZK</subfield><subfield code="d">TXI</subfield><subfield code="d">LOA</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">MOQ</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">A6Q</subfield><subfield code="d">G3B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">M8D</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">70835645</subfield><subfield code="a">84375330</subfield><subfield code="a">181421097</subfield><subfield code="a">319430932</subfield><subfield code="a">473077337</subfield><subfield code="a">475327153</subfield><subfield code="a">506996807</subfield><subfield code="a">593862179</subfield><subfield code="a">647464655</subfield><subfield code="a">722429452</subfield><subfield code="a">765142604</subfield><subfield code="a">961586336</subfield><subfield code="a">962649502</subfield><subfield code="a">966209827</subfield><subfield code="a">988513223</subfield><subfield code="a">991937741</subfield><subfield code="a">1035649685</subfield><subfield code="a">1037507205</subfield><subfield code="a">1038624702</subfield><subfield code="a">1044332891</subfield><subfield code="a">1045536321</subfield><subfield code="a">1049065933</subfield><subfield code="a">1055351608</subfield><subfield code="a">1056375731</subfield><subfield code="a">1060197007</subfield><subfield code="a">1073065287</subfield><subfield code="a">1081252093</subfield><subfield code="a">1103262209</subfield><subfield code="a">1129365695</subfield><subfield code="a">1152996875</subfield><subfield code="a">1162219316</subfield><subfield code="a">1179544696</subfield><subfield code="a">1192338936</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754298</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754299</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488560</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488561</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490313</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490318</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035572</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035578</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035570</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035575</subfield></datafield><datafield tag="024" ind1="1" ind2=" "><subfield code="a">792502903186</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)64187875</subfield><subfield code="z">(OCoLC)70835645</subfield><subfield code="z">(OCoLC)84375330</subfield><subfield code="z">(OCoLC)181421097</subfield><subfield code="z">(OCoLC)319430932</subfield><subfield code="z">(OCoLC)473077337</subfield><subfield code="z">(OCoLC)475327153</subfield><subfield code="z">(OCoLC)506996807</subfield><subfield code="z">(OCoLC)593862179</subfield><subfield code="z">(OCoLC)647464655</subfield><subfield code="z">(OCoLC)722429452</subfield><subfield code="z">(OCoLC)765142604</subfield><subfield code="z">(OCoLC)961586336</subfield><subfield code="z">(OCoLC)962649502</subfield><subfield code="z">(OCoLC)966209827</subfield><subfield code="z">(OCoLC)988513223</subfield><subfield code="z">(OCoLC)991937741</subfield><subfield code="z">(OCoLC)1035649685</subfield><subfield code="z">(OCoLC)1037507205</subfield><subfield code="z">(OCoLC)1038624702</subfield><subfield code="z">(OCoLC)1044332891</subfield><subfield code="z">(OCoLC)1045536321</subfield><subfield code="z">(OCoLC)1049065933</subfield><subfield code="z">(OCoLC)1055351608</subfield><subfield code="z">(OCoLC)1056375731</subfield><subfield code="z">(OCoLC)1060197007</subfield><subfield code="z">(OCoLC)1073065287</subfield><subfield code="z">(OCoLC)1081252093</subfield><subfield code="z">(OCoLC)1103262209</subfield><subfield code="z">(OCoLC)1129365695</subfield><subfield code="z">(OCoLC)1152996875</subfield><subfield code="z">(OCoLC)1162219316</subfield><subfield code="z">(OCoLC)1179544696</subfield><subfield code="z">(OCoLC)1192338936</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000038</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S846 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stephens, Robert</subfield><subfield code="c">(Information security consultant)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjwywVXhhmfmWtVd9xKq33</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2016154994</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Configuring Check Point NGX VPN-1/FireWall-1 /</subfield><subfield code="c">Robert Stephens, Barry J. Stiefel, Stephen Watkins.</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Check Point NGX</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 625) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. Introduction to firewalls and VPN-1/FireWall-1 -- 2. What's new in NGX -- 3. Installing check point NGX -- 4. Upgrading to NGX -- 5. SmartDashboard and SmartPortal -- 6. SmartView tracker -- 7. SmartDefense and Web intelligence -- 8. Network address translation -- 9. Authentication -- 10. Content security and OPSEC -- 11. VPN -- 12. SecuRemote, SecureClient, and Integrity -- 13. SmartUpdate -- 14. SecurePlatform -- 15. Monitoring tools -- 16. Enabling voice-over-IP traffic.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">FireWall-1.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00006011</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Computer programs.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Computer programs.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Extranets (Computer networks)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Firewalls (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stiefel, Barry J.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Watkins, Stephen</subfield><subfield code="c">(Information security professional)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjrGc8vjbVBywFWYHmvrFX</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007041572</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Configuring Check Point NGX VPN-1/FireWall-1 (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGRRDv7H3vFqxkR49hRvgX</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Stephens, Robert.</subfield><subfield code="t">Configuring Check Point NGX VPN-1/FireWall-1.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2005</subfield><subfield code="z">1597490318</subfield><subfield code="w">(OCoLC)62615252</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149584</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00005199</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Brodart</subfield><subfield code="b">BROD</subfield><subfield code="n">04464052</subfield><subfield code="c">$49.95</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10110278</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">149584</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">configuringcheck0000step</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730610</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2395153</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm64187875 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:50Z |
institution | BVB |
isbn | 1423754298 9781423754299 0080488560 9780080488561 9781597490313 1597490318 1281035572 9781281035578 9786611035570 6611035575 |
language | English |
oclc_num | 64187875 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxx, 625) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Stephens, Robert (Information security consultant) https://id.oclc.org/worldcat/entity/E39PCjwywVXhhmfmWtVd9xKq33 http://id.loc.gov/authorities/names/no2016154994 Configuring Check Point NGX VPN-1/FireWall-1 / Robert Stephens, Barry J. Stiefel, Stephen Watkins. Check Point NGX Rockland, MA : Syngress Pub., ©2005. 1 online resource (xxx, 625) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Print version record. 1. Introduction to firewalls and VPN-1/FireWall-1 -- 2. What's new in NGX -- 3. Installing check point NGX -- 4. Upgrading to NGX -- 5. SmartDashboard and SmartPortal -- 6. SmartView tracker -- 7. SmartDefense and Web intelligence -- 8. Network address translation -- 9. Authentication -- 10. Content security and OPSEC -- 11. VPN -- 12. SecuRemote, SecureClient, and Integrity -- 13. SmartUpdate -- 14. SecurePlatform -- 15. Monitoring tools -- 16. Enabling voice-over-IP traffic. Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. English. FireWall-1. blmlsh Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) blmlsh Computer networks Security measures Computer programs. blmlsh Computer security Computer programs. blmlsh Extranets (Computer networks) blmlsh Computer networks Security measures fast Firewalls (Computer security) fast Stiefel, Barry J. Watkins, Stephen (Information security professional) https://id.oclc.org/worldcat/entity/E39PCjrGc8vjbVBywFWYHmvrFX http://id.loc.gov/authorities/names/no2007041572 has work: Configuring Check Point NGX VPN-1/FireWall-1 (Text) https://id.oclc.org/worldcat/entity/E39PCGRRDv7H3vFqxkR49hRvgX https://id.oclc.org/worldcat/ontology/hasWork Print version: Stephens, Robert. Configuring Check Point NGX VPN-1/FireWall-1. Rockland, MA : Syngress Pub., ©2005 1597490318 (OCoLC)62615252 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149584 Volltext |
spellingShingle | Stephens, Robert (Information security consultant) Configuring Check Point NGX VPN-1/FireWall-1 / 1. Introduction to firewalls and VPN-1/FireWall-1 -- 2. What's new in NGX -- 3. Installing check point NGX -- 4. Upgrading to NGX -- 5. SmartDashboard and SmartPortal -- 6. SmartView tracker -- 7. SmartDefense and Web intelligence -- 8. Network address translation -- 9. Authentication -- 10. Content security and OPSEC -- 11. VPN -- 12. SecuRemote, SecureClient, and Integrity -- 13. SmartUpdate -- 14. SecurePlatform -- 15. Monitoring tools -- 16. Enabling voice-over-IP traffic. FireWall-1. blmlsh Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) blmlsh Computer networks Security measures Computer programs. blmlsh Computer security Computer programs. blmlsh Extranets (Computer networks) blmlsh Computer networks Security measures fast Firewalls (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh00006011 |
title | Configuring Check Point NGX VPN-1/FireWall-1 / |
title_alt | Check Point NGX |
title_auth | Configuring Check Point NGX VPN-1/FireWall-1 / |
title_exact_search | Configuring Check Point NGX VPN-1/FireWall-1 / |
title_full | Configuring Check Point NGX VPN-1/FireWall-1 / Robert Stephens, Barry J. Stiefel, Stephen Watkins. |
title_fullStr | Configuring Check Point NGX VPN-1/FireWall-1 / Robert Stephens, Barry J. Stiefel, Stephen Watkins. |
title_full_unstemmed | Configuring Check Point NGX VPN-1/FireWall-1 / Robert Stephens, Barry J. Stiefel, Stephen Watkins. |
title_short | Configuring Check Point NGX VPN-1/FireWall-1 / |
title_sort | configuring check point ngx vpn 1 firewall 1 |
topic | FireWall-1. blmlsh Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Firewalls (Computer security) http://id.loc.gov/authorities/subjects/sh00006011 Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Firewalls (Computer security) blmlsh Computer networks Security measures Computer programs. blmlsh Computer security Computer programs. blmlsh Extranets (Computer networks) blmlsh Computer networks Security measures fast Firewalls (Computer security) fast |
topic_facet | FireWall-1. Computer networks Security measures. Firewalls (Computer security) Réseaux d'ordinateurs Sécurité Mesures. Coupe-feu (Sécurité informatique) COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer programs. Computer security Computer programs. Extranets (Computer networks) Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=149584 |
work_keys_str_mv | AT stephensrobert configuringcheckpointngxvpn1firewall1 AT stiefelbarryj configuringcheckpointngxvpn1firewall1 AT watkinsstephen configuringcheckpointngxvpn1firewall1 AT stephensrobert checkpointngx AT stiefelbarryj checkpointngx AT watkinsstephen checkpointngx |