LEADER 02941nam 2200613Ia 450 001 9910455228103321 005 20170815144822.0 010 $a1-281-05305-8 010 $a9786611053055 010 $a0-08-047645-7 035 $a(CKB)111035898514126 035 $a(EBL)294029 035 $a(OCoLC)437181421 035 $a(SSID)ssj0000120331 035 $a(PQKBManifestationID)11999678 035 $a(PQKBTitleCode)TC0000120331 035 $a(PQKBWorkID)10092658 035 $a(PQKB)11317341 035 $a(OCoLC)559725357 035 $a(MiAaPQ)EBC294029 035 $a(CaSebORM)9781928994749 035 $a(EXLCZ)99111035898514126 100 $a20020517d2002 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCheck Point NG$b[electronic resource] $enext generation security administration /$fDrew Simonis ... [et al.] 205 $aFirst edition. 210 $aRockland, Mass. $cSyngress Publishing, Inc.$dc2002 215 $a1 online resource (657 p.) 300 $aIncludes index. 311 $a1-928994-74-1 327 $aCover; Contents; Foreword; Chapter 1 Introduction to Check Point Next Generation; Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation; Chapter 3 Using the Graphical Interface; Chapter 4 Creating a Security Policy; Chapter 5 Applying Network Address Translation; Chapter 6 Authenticating Users; Chapter 7 Open Security (OPSEC) and Content Filtering; Chapter 8 Managing Policies and Logs; Chapter 9 Tracking and Alerts; Chapter 10 Configuring Virtual Private Networks; Chapter 11 Securing Remote Clients; Chapter 12 Advanced Configurations; Appendix A Class C Subnet Mask Cheat Sheet 327 $aAppendix B Spoofing: Attacks on Trusted IdentityIndex 330 $aUnparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations. 606 $aComputer security 606 $aComputers$xAccess control 606 $aDatabase security 608 $aElectronic books. 615 0$aComputer security. 615 0$aComputers$xAccess control. 615 0$aDatabase security. 676 $a005.8 700 $aSimonis$b Drew$01035463 701 $aSimonis$b Drew$01035463 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910455228103321 996 $aCheck Point NG$92455181 997 $aUNINA