|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910779969303321 |
|
|
Autore |
Simonis Drew |
|
|
Titolo |
Check Point NG [[electronic resource] ] : next generation security administration / / Drew Simonis ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, Mass., : Syngress Publishing, Inc., c2002 |
|
|
|
|
|
|
|
ISBN |
|
1-281-05305-8 |
9786611053055 |
0-08-047645-7 |
|
|
|
|
|
|
|
|
Edizione |
[First edition.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (657 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computers - Access control |
Database security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet |
Appendix B Spoofing: Attacks on Trusted IdentityIndex |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations. |
|
|
|
|
|
|
|