Check Point FireWall-1® : administration guide /

"With this unique guide, you can find the most current and comprehensive information on Check Point's FireWall-1 - all in a single volume."--BOOK JACKET. "The authors clearly explain the underlying concepts of protection that all security professionals should know. Using a hands-...

תיאור מלא

שמור ב:
מידע ביבליוגרפי
מחבר ראשי: Goncalves, Marcus
מחברים אחרים: Brown, Steven A.
פורמט: ספר
שפה:English
יצא לאור: New York : McGraw-Hill, c2000.
נושאים:
גישה מקוונת:Publisher description
LEADER 03385cam a22004218a 4500
001 c000398683
003 CARM
005 20150225101938.0
008 990107s2000 nyua b 001 0 eng
010 |a 99011435 
015 |a GBA0-14733 
019 1 |a 24008932  |5 LACONCORD2021 
020 |a 007134229X (set) 
035 |a (OCoLC)224584463  |5 LACONCORD2021 
040 |a LC  |b eng  |c LC 
042 |a pcc 
050 0 0 |a TK5105.59  |b .G6497 1999 
082 0 0 |a 658.4/78  |2 21 
082 0 4 |a 005.8  |2 21 
100 1 |a Goncalves, Marcus. 
245 1 0 |a Check Point FireWall-1® :  |b administration guide /  |c Marcus Goncalves, Steven A. Brown. 
260 |a New York :  |b McGraw-Hill,  |c c2000. 
300 |a xx, 452 p. :  |b ill. ;  |c 24 cm. +  |e 1 computer optical disc (4 3/4 in.). 
500 |a One computer optical disc in pocket attached to inside back cover. 
504 |a Includes bibliographical references (p. 436) and index. 
505 0 |a Pt. I. FireWall-1 Overview and Configuration. Ch. 1. Introduction To Firewall Technology. Ch. 2. Check Point FireWall-1 Architecture. Ch. 3. Check Point FireWall-1 Installation and Configuration -- Pt. II. Administering FireWall-1 Security Policy. Ch. 4. Security Policy. Ch. 5. Setting Up a Rule Base for FireWall-1. Ch. 6. Advanced Security with Check Point FireWall-1. Ch. 7. Encryption Technology. Ch. 8. Check Point FireWall-1 Virtual Private Networking. Ch. 9. FireWall-1 SecuRemote. Ch. 10. INSPECT Language -- Pt. III. Advanced Configuration Installations. Ch. 11. Open Platform for Secure Enterprise Connectivity Architecture. Ch. 12. Active Network Configuration and Logging. Ch. 13. Advanced Firewall Security Topics -- App. A. TCP/IP Transport Layer Protocols -- App. B. TCP/IP Application-Layer Protocols. 
520 1 |a "With this unique guide, you can find the most current and comprehensive information on Check Point's FireWall-1 - all in a single volume."--BOOK JACKET. "The authors clearly explain the underlying concepts of protection that all security professionals should know. Using a hands-on approach, the authors guide you through the complex process of designing, building, and maintaining firewalls using Check Point's FireWall-1."--BOOK JACKET. "Throughout the book, extensive case studies discuss the many security threats to corporate Intranet and Internet sites - and show you how to avoid them using FireWall-1. You'll also find an invaluable CD-ROM that contains an evaluation copy of Check Point's FireWall-1 product, so you can see the benefits of this great product for yourself."--BOOK JACKET. "Check Point FireWall-1 Administration Guide is ideal for administrators and professionals who need to install FireWall-1 for Windows and UNIX."--BOOK JACKET. 
630 0 4 |a Fire Wall-1 (Computer file) 
630 0 0 |a Fire Wall-1 
650 0 |a Computer networks  |x Security measures  |x Computer programs. 
650 0 |a Computer security  |x Computer programs. 
700 1 |a Brown, Steven A. 
852 8 |b CARM  |p 0611819  |n CD missing  |f BK 
852 8 |b SCAN  |h A3:AI21E0  |i F09070  |p 0611819  |f BK 
856 4 2 |3 Publisher description  |u http://www.loc.gov/catdir/description/mh023/99011435.html 
999 f f |i 35b8fc08-324d-53e3-bc96-cc4e6be701c3  |s 06a14c33-fb6f-5edf-afe0-4dc00928a94f 
952 f f |p Can circulate  |a CAVAL  |b CAVAL  |c CAVAL  |d CARM 1 Store  |i book  |m 0611819 
952 f f |a CAVAL  |b CAVAL  |c CAVAL  |d Unmapped Location  |e F09070  |f A3:AI21E0  |h Other scheme