LEADER 00000cam a2200649Ia 4500 001 ocm52730276 003 OCoLC 005 20160527041330.5 006 m o d 007 cr cn||||||||| 008 030728s2003 maua o 001 0 eng d 019 62882563|a70742413|a162599080|a475474375|a559340796 |a606021348|a646713808|a722153953|a728000578 020 193226681X|q(electronic book) 020 9781932266818|q(electronic book) 020 9781931836975 020 1931836973 035 (OCoLC)52730276|z(OCoLC)62882563|z(OCoLC)70742413 |z(OCoLC)162599080|z(OCoLC)475474375|z(OCoLC)559340796 |z(OCoLC)606021348|z(OCoLC)646713808|z(OCoLC)722153953 |z(OCoLC)728000578 037 100746:100752|bElsevier Science & Technology|nhttp:// www.sciencedirect.com 040 N$T|beng|epn|cN$T|dBAKER|dOCLCQ|dTUU|dOCLCQ|dTNF|dOCLCQ |dOCLCF|dOCLCO|dNLGGC|dOCLCQ|dOPELS|dB24X7|dMERUC|dCCO |dE7B|dNTG|dWPG|dREDDC|dDKDLA|dU5D|dFVL|dDEBSZ|dOCLCQ 049 RIDW 050 4 QA76.9.A25|bN63 2003eb 072 7 COM|x060040|2bisacsh 072 7 COM|x043050|2bisacsh 072 7 COM|x053000|2bisacsh 082 04 005.8|221 090 QA76.9.A25|bN63 2003eb 100 1 Noble, Jim.|0https://id.loc.gov/authorities/names/ n91002966 245 10 Check Point NG VPN-1/Firewall-1 :|badvanced configuration and troubleshooting /|cJim Noble [and others]. 264 1 Rockland, MA :|bSyngress,|c[2003] 264 4 |c©2003 300 1 online resource (xxxi, 606 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 340 |gpolychrome|2rdacc 347 text file|2rdaft 500 Includes index. 520 Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. Check Point recently announced a ground-breaking user interface that meets the industry's next generation Internet security requirements, including simplified security management for increasingly complex environments. Built upon Check Point's Secure Virtual Network (SVN) architecture, the Next Generation User Interface revolutionizes the way security administrators define and manage enterprise security by further integrating management functions into a security dashboard and creating a visual picture of security operations. The Next Generation User Interface delivers unparalleled ease-of- use, improved security and true end-to-end security management. Check Point's revenues have more than doubled in each of the last two years, while capturing over 50% of the VPN market and over 40% of the firewall market according to IDC Research. The explosive growth of the company is further evidenced by over 29,000 IT professionals becoming Check Point Certified so far. This book will be the complimentary to Syngress' best-selling Check Point Next Generation Security Administration, which was a foundation-level guide to installing and configuring Check Point NG. This book will assume that readers have already mastered the basic functions of the product and they now want to master the more advanced security and VPN features of the product. Written by a team of Check Point Certified Instructors (the most prestigious Check Point certification) this book will provide readers with a complete reference book to Check Point NG and advanced case studies that illustrate the most difficult to implement configurations. Although not a Study Guide, this book will cover all of the objectives on Check Point's CCSE Exam. The reader will learn to design and configure a Virtual Private Network (VPN). The reader will learn to configure Check Point NG for High Availability (HA), which is the ability of a system to perform its function continuously (without interruption) for a significantly longer period of time than the reliabilities of its individual components would suggest. The reader will learn to use SeucureUpdate, which allows them to perform simultaneous, secure, enterprise-wide software updates. 588 0 Print version record. 590 eBooks on EBSCOhost|bEBSCO eBook Subscription Academic Collection - North America 650 0 Computer security|0https://id.loc.gov/authorities/subjects /sh90001862|xComputer programs.|0https://id.loc.gov/ authorities/subjects/sh99005296 650 0 Firewalls (Computer security)|0https://id.loc.gov/ authorities/subjects/sh00006011 650 0 Computer networks|xSecurity measures|0https://id.loc.gov/ authorities/subjects/sh94001277|xComputer programs.|0https ://id.loc.gov/authorities/subjects/sh99005296 650 7 Computer security|xComputer programs.|2fast|0https:// id.worldcat.org/fast/872486 650 7 Computer security.|2fast|0https://id.worldcat.org/fast/ 872484 650 7 Firewalls (Computer security)|2fast|0https:// id.worldcat.org/fast/925719 650 7 Computer networks|xSecurity measures|xComputer programs. |2fast|0https://id.worldcat.org/fast/872342 650 7 Computer networks|xSecurity measures.|2fast|0https:// id.worldcat.org/fast/872341 655 4 Electronic books. 776 08 |iPrint version:|aNoble, Jim.|tCheck Point NG VPN-1/ Firewall-1.|dRockland, MA : Syngress, ©2003|z1931836973 |w(OCoLC)51992799 856 40 |uhttps://rider.idm.oclc.org/login?url=http:// search.ebscohost.com/login.aspx?direct=true&scope=site& db=nlebk&AN=85659|zOnline eBook. Access restricted to current Rider University students, faculty, and staff. 856 42 |3Instructions for reading/downloading this eBook|uhttp:// guides.rider.edu/ebooks/ebsco 901 MARCIVE 20231220 948 |d20160615|cEBSCO|tebscoebooksacademic|lridw 994 92|bRID