Check Point Next Generation Security Administration (Paperback)
Cherie Amon, Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock
- 出版商: Syngress Media
- 售價: $2,490
- 貴賓價: 9.5 折 $2,366
- 語言: 英文
- 頁數: 800
- 裝訂: Paperback
- ISBN: 1928994741
- ISBN-13: 9781928994749
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$1,200$1,176 -
$1,090$1,068 -
$2,010$1,910 -
$2,610$2,480 -
$680$537 -
$1,550$1,473 -
$980$774 -
$2,660$2,520 -
$970Introduction to Algorithms, 2/e
-
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$1,710$1,625 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,300$1,274 -
$2,340$2,223 -
$1,650$1,568 -
$620$558 -
$580$493 -
$650$553 -
$860$731 -
$720$569 -
$750$675 -
$590$460 -
$390$332 -
$267深入淺出 SSD:固態存儲核心技術、原理與實戰
相關主題
商品描述
The Complete Guide to Check Point NG
The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of Enterprise Security Solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Check Point NG Security Administration will show you the ins and outs of the NG product line.
- Install and Configure VPN-1/FireWall-1 Next Generation
Find step-by-step coverage of installing NG on Windows, Solaris, and Nokia platforms. - Manage Network Objects
Learn how to use Network Objects Manager and manage a network range, a group of users, or a single workstation. - Write and Implement a Security Policy
Review the steps to write a security policy: introduction, guidelines, standards, procedures, deployment, enforcement, and modification. - Review FireWall-1 Authentication Schemes
Find complete coverage of S/Key, SecurID, OS Password, VPN-1, and FireWall authentication. - Master Check Point's OPSEC
See how the Open Platform for Security model enables you to implement third-party vendor applications into your firewall environment. - Manage Firewall Logs
Review the log views available to you and learn when to use the three logs: log mode, active mode, and audit mode. - Use Check Point Malicious Activity Detection (CPMAD)
Learn how the CPMAD log analyzer can help detect unusual or dangerous activities across a range of firewall modules. - Configure Secure VPNs
Install and use SecuRemote Client Software to manage your VPNs. - Install a Policy Server
See how Check Point's SecureClient and Policy Server help reduce the risk of a remote user's desktop being compromised. - Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1Introduction to Check Point Next Generation
Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation
Chapter 3Using the Graphical Interface
Chapter 4Creating a Security Policy
Chapter 5Applying Network Address Translation
Chapter 6Authenticating Users
Chapter 7Open Security (OPSEC) and Content Filtering
Chapter 8Managing Policies and Logs
Chapter 9Tracking and Alerts
Chapter 10Configuring Virtual Private Networks
Chapter 11Securing Remote Clients
Chapter 12Advanced Configurations
商品描述(中文翻譯)
《Check Point NG 完全指南》
Check Point Next Generation 產品套件提供了開發和部署企業安全解決方案所需的工具。Check Point VPN-1/FireWall-1 多年來一直在擊敗競爭對手,而 Next Generation 軟體繼續改進這款軟體的外觀、使用感受和易用性。《Check Point NG 安全管理》將向您展示 NG 產品系列的內外情況。
- 安裝和配置 VPN-1/FireWall-1 Next Generation:詳細介紹在 Windows、Solaris 和 Nokia 平台上安裝 NG 的步驟。
- 管理網路物件:學習如何使用網路物件管理器來管理網路範圍、使用者群組或單個工作站。
- 撰寫和實施安全策略:回顧撰寫安全策略的步驟:介紹、指南、標準、程序、部署、執行和修改。
- 檢視 FireWall-1 認證方案:完整介紹 S/Key、SecurID、作業系統密碼、VPN-1 和 FireWall 認證。
- 掌握 Check Point 的 OPSEC:了解開放式安全平台模型如何讓您將第三方供應商應用程式整合到您的防火牆環境中。
- 管理防火牆日誌:檢視可用的日誌檢視,並學習何時使用三種日誌:日誌模式、主動模式和審計模式。
- 使用 Check Point 惡意活動偵測 (CPMAD):了解 CPMAD 日誌分析器如何幫助檢測防火牆模組範圍內的異常或危險活動。
- 配置安全 VPN:安裝和使用 SecuRemote 客戶端軟體來管理您的 VPN。
- 安裝策略伺服器:了解 Check Point 的 SecureClient 和策略伺服器如何幫助降低遠程使用者桌面被入侵的風險。
- 註冊您的 1 年升級:Syngress Solutions 升級計劃保護您免受內容過時的影響,並提供每月郵件、白皮書等等!
《目錄》
第 1 章:Check Point Next Generation 簡介
第 2 章:安裝和配置 VPN-1/FireWall-1 Next Generation
第 3 章:使用圖形介面
第 4 章:建立安全策略
第 5 章:應用網路位址轉換
第 6 章:驗證使用者
第 7 章:開放式安全 (OPSEC) 和內容篩選
第 8 章:管理策略和日誌
第 9 章:追蹤和警示