Check Point Next Generation Security Administration (Paperback)
Cherie Amon, Allen V. Keele, Daniel Kligerman, Drew Simonis, Corey Pincock
- 出版商: Syngress Media
- 售價: $2,550
- 貴賓價: 9.5 折 $2,423
- 語言: 英文
- 頁數: 800
- 裝訂: Paperback
- ISBN: 1928994741
- ISBN-13: 9781928994749
-
相關分類:
資訊安全
已過版
買這商品的人也買了...
-
$1,200$1,176 -
$1,090$1,068 -
$2,050$1,948 -
$2,660$2,527 -
$680$537 -
$1,590$1,511 -
$980$774 -
$2,660The Linux Web Server CD Bookshelf,
-
$970Introduction to Algorithms, 2/e
-
$825Cisco CCNA Exam #640-607 Certification Guide, 3/e
-
$1,740$1,653 -
$1,274Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$1,300$1,274 -
$2,390$2,271 -
$1,650$1,568 -
$620$527 -
$580$493 -
$650$514 -
$860$731 -
$720$569 -
$750$638 -
$590$460 -
$390$308 -
$454深入淺出 SSD:固態存儲核心技術、原理與實戰
商品描述
The Complete Guide to Check Point NG
The Check Point Next Generation suite of products provides the tools necessary for easy development and deployment of Enterprise Security Solutions. Check Point VPN-1/FireWall-1 has been beating out its competitors for years, and the Next Generation software continues to improve the look, feel, and ease of use of this software. Check Point NG Security Administration will show you the ins and outs of the NG product line.
- Install and Configure VPN-1/FireWall-1 Next Generation
Find step-by-step coverage of installing NG on Windows, Solaris, and Nokia platforms. - Manage Network Objects
Learn how to use Network Objects Manager and manage a network range, a group of users, or a single workstation. - Write and Implement a Security Policy
Review the steps to write a security policy: introduction, guidelines, standards, procedures, deployment, enforcement, and modification. - Review FireWall-1 Authentication Schemes
Find complete coverage of S/Key, SecurID, OS Password, VPN-1, and FireWall authentication. - Master Check Point's OPSEC
See how the Open Platform for Security model enables you to implement third-party vendor applications into your firewall environment. - Manage Firewall Logs
Review the log views available to you and learn when to use the three logs: log mode, active mode, and audit mode. - Use Check Point Malicious Activity Detection (CPMAD)
Learn how the CPMAD log analyzer can help detect unusual or dangerous activities across a range of firewall modules. - Configure Secure VPNs
Install and use SecuRemote Client Software to manage your VPNs. - Install a Policy Server
See how Check Point's SecureClient and Policy Server help reduce the risk of a remote user's desktop being compromised. - Register for Your 1 Year Upgrade
The Syngress Solutions upgrade plan protects you from content obsolescence and provides monthly mailings, whitepapers, and more!
Contents
Chapter 1Introduction to Check Point Next Generation
Chapter 2 Installing and Configuring VPN-1/FireWall-1 Next Generation
Chapter 3Using the Graphical Interface
Chapter 4Creating a Security Policy
Chapter 5Applying Network Address Translation
Chapter 6Authenticating Users
Chapter 7Open Security (OPSEC) and Content Filtering
Chapter 8Managing Policies and Logs
Chapter 9Tracking and Alerts
Chapter 10Configuring Virtual Private Networks
Chapter 11Securing Remote Clients
Chapter 12Advanced Configurations