03268nam 2200673Ia 450 991078374500332120230120004203.01-281-03557-297866110355700-08-048856-01-4237-5429-8(CKB)1000000000246647(EBL)258633(OCoLC)181421097(SSID)ssj0000074242(PQKBManifestationID)11107736(PQKBTitleCode)TC0000074242(PQKBWorkID)10118066(PQKB)10954448(Au-PeEL)EBL258633(CaPaEBR)ebr10110278(CaONFJC)MIL103557(OCoLC)842282052(CaSebORM)9781597490313(MiAaPQ)EBC258633(EXLCZ)99100000000024664720060420d2005 uy 0engur|n|---|||||txtccrConfiguring Check Point NGX VPN-1/FireWall-1[electronic resource] /Robert Stephens ... [et al.] ; foreword by Dameon D. Welch-Abernathy1st editionRockland, Mass. Syngress Pub.c20051 online resource (656 p.)Includes index.1-59749-031-8 Cover; Contents; Foreword; Chapter 1 Introduction to Firewalls and VPN-1/FireWall-1; Chapter 2 What's New in NGX; Chapter 3 Installing Check Point NGX; Chapter 4 Upgrading to NGX; Chapter 5 SmartDashboard and SmartPortal; Chapter 6 SmartView Tracker; Chapter 7 SmartDefense and Web Intelligence; Chapter 8 Network Address Translation; Chapter 9 Authentication; Chapter 10 Content Security and OPSEC; Chapter 11 VPN; Chapter 12 SecuRemote, SecureClient, and Integrity; Chapter 13 SmartUpdate; Chapter 14 SecurePlatform; Chapter 15 Monitoring Tools; Chapter 16 Enabling Voice-over-IP Traffic; IndexRelated TitlesCheck Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection & Tunnel Management, Multiple Entry Points, Route Injection Mechanism, Wire Mode, and SecurePlatform Pro. Many of the new features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available *and* secure. Demand for this book will be strong because Check Point is rCheck Point NGX VPN-1/FireWall-1Computer networksSecurity measuresComputer programsComputer securityComputer programsExtranets (Computer networks)Firewalls (Computer security)Computer networksSecurity measuresComputer programs.Computer securityComputer programs.Extranets (Computer networks)Firewalls (Computer security)005.8Stephens RobertautMiAaPQMiAaPQMiAaPQBOOK9910783745003321Configuring Check Point NGX VPN-13813090UNINA01345nam1 22003493i 450 RMS007415420251003044344.020100528d1999 ||||0itac50 baengdez01i xxxe z01nComputing with words in information/intelligent systemsnLotfi A. Zadeh, Janusz Kacprzyk edsHeidelberg (etc.)Psyca-verlagSpringer-verlagv.fig.tab. ; 24 cmStudies in fuzziness and soft computing001AQ100246762001 Studies in fuzziness and soft computing001RMS00741682001 ˆ2: ‰applicationsLotfi A. Zadeh, Janusz Kacprzyk eds006.3INTELLIGENZA ARTIFICIALE14006.35cd 2022Kacprzyk, JanuszMILV033557Zadeh, Lotfi AskerMILV088202Zadeh, L. A.MILV208737Zadeh, Lotfi AskerITIT-00000020100528IT-BN0095 NAP 01RCOST Materiale bibliografico trasferito come da verbale del 15/07/2009RMS0074154Biblioteca Centralizzata di Ateneov. 2 01RCOST 006.3 COMWWI1 01Computing with words in information1574761UNISANNIO