Skip to content
You are not logged in |Login  

LEADER 00000cam a2200649Ia 4500 
001    ocm52730276  
003    OCoLC 
005    20160527041330.5 
006    m     o  d         
007    cr cn||||||||| 
008    030728s2003    maua    o     001 0 eng d 
019    62882563|a70742413|a162599080|a475474375|a559340796
       |a606021348|a646713808|a722153953|a728000578 
020    193226681X|q(electronic book) 
020    9781932266818|q(electronic book) 
020    9781931836975 
020    1931836973 
035    (OCoLC)52730276|z(OCoLC)62882563|z(OCoLC)70742413
       |z(OCoLC)162599080|z(OCoLC)475474375|z(OCoLC)559340796
       |z(OCoLC)606021348|z(OCoLC)646713808|z(OCoLC)722153953
       |z(OCoLC)728000578 
037    100746:100752|bElsevier Science & Technology|nhttp://
       www.sciencedirect.com 
040    N$T|beng|epn|cN$T|dBAKER|dOCLCQ|dTUU|dOCLCQ|dTNF|dOCLCQ
       |dOCLCF|dOCLCO|dNLGGC|dOCLCQ|dOPELS|dB24X7|dMERUC|dCCO
       |dE7B|dNTG|dWPG|dREDDC|dDKDLA|dU5D|dFVL|dDEBSZ|dOCLCQ 
049    RIDW 
050  4 QA76.9.A25|bN63 2003eb 
072  7 COM|x060040|2bisacsh 
072  7 COM|x043050|2bisacsh 
072  7 COM|x053000|2bisacsh 
082 04 005.8|221 
090    QA76.9.A25|bN63 2003eb 
100 1  Noble, Jim.|0https://id.loc.gov/authorities/names/
       n91002966 
245 10 Check Point NG VPN-1/Firewall-1 :|badvanced configuration 
       and troubleshooting /|cJim Noble [and others]. 
264  1 Rockland, MA :|bSyngress,|c[2003] 
264  4 |c©2003 
300    1 online resource (xxxi, 606 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
340    |gpolychrome|2rdacc 
347    text file|2rdaft 
500    Includes index. 
520    Check Point Software Technologies is the worldwide leader 
       in securing the Internet. The company's Secure Virtual 
       Network (SVN) architecture provides the infrastructure 
       that enables secure and reliable Internet communications. 
       Check Point recently announced a ground-breaking user 
       interface that meets the industry's next generation 
       Internet security requirements, including simplified 
       security management for increasingly complex environments.
       Built upon Check Point's Secure Virtual Network (SVN) 
       architecture, the Next Generation User Interface 
       revolutionizes the way security administrators define and 
       manage enterprise security by further integrating 
       management functions into a security dashboard and 
       creating a visual picture of security operations. The Next
       Generation User Interface delivers unparalleled ease-of-
       use, improved security and true end-to-end security 
       management. Check Point's revenues have more than doubled 
       in each of the last two years, while capturing over 50% of
       the VPN market and over 40% of the firewall market 
       according to IDC Research. The explosive growth of the 
       company is further evidenced by over 29,000 IT 
       professionals becoming Check Point Certified so far. This 
       book will be the complimentary to Syngress' best-selling 
       Check Point Next Generation Security Administration, which
       was a foundation-level guide to installing and configuring
       Check Point NG. This book will assume that readers have 
       already mastered the basic functions of the product and 
       they now want to master the more advanced security and VPN
       features of the product. Written by a team of Check Point 
       Certified Instructors (the most prestigious Check Point 
       certification) this book will provide readers with a 
       complete reference book to Check Point NG and advanced 
       case studies that illustrate the most difficult to 
       implement configurations. Although not a Study Guide, this
       book will cover all of the objectives on Check Point's 
       CCSE Exam. The reader will learn to design and configure a
       Virtual Private Network (VPN). The reader will learn to 
       configure Check Point NG for High Availability (HA), which
       is the ability of a system to perform its function 
       continuously (without interruption) for a significantly 
       longer period of time than the reliabilities of its 
       individual components would suggest. The reader will learn
       to use SeucureUpdate, which allows them to perform 
       simultaneous, secure, enterprise-wide software updates. 
588 0  Print version record. 
590    eBooks on EBSCOhost|bEBSCO eBook Subscription Academic 
       Collection - North America 
650  0 Computer security|0https://id.loc.gov/authorities/subjects
       /sh90001862|xComputer programs.|0https://id.loc.gov/
       authorities/subjects/sh99005296 
650  0 Firewalls (Computer security)|0https://id.loc.gov/
       authorities/subjects/sh00006011 
650  0 Computer networks|xSecurity measures|0https://id.loc.gov/
       authorities/subjects/sh94001277|xComputer programs.|0https
       ://id.loc.gov/authorities/subjects/sh99005296 
650  7 Computer security|xComputer programs.|2fast|0https://
       id.worldcat.org/fast/872486 
650  7 Computer security.|2fast|0https://id.worldcat.org/fast/
       872484 
650  7 Firewalls (Computer security)|2fast|0https://
       id.worldcat.org/fast/925719 
650  7 Computer networks|xSecurity measures|xComputer programs.
       |2fast|0https://id.worldcat.org/fast/872342 
650  7 Computer networks|xSecurity measures.|2fast|0https://
       id.worldcat.org/fast/872341 
655  4 Electronic books. 
776 08 |iPrint version:|aNoble, Jim.|tCheck Point NG VPN-1/
       Firewall-1.|dRockland, MA : Syngress, ©2003|z1931836973
       |w(OCoLC)51992799 
856 40 |uhttps://rider.idm.oclc.org/login?url=http://
       search.ebscohost.com/login.aspx?direct=true&scope=site&
       db=nlebk&AN=85659|zOnline eBook. Access restricted to 
       current Rider University students, faculty, and staff. 
856 42 |3Instructions for reading/downloading this eBook|uhttp://
       guides.rider.edu/ebooks/ebsco 
901    MARCIVE 20231220 
948    |d20160615|cEBSCO|tebscoebooksacademic|lridw 
994    92|bRID