With this unique guide, you can find the most current and comprehensive information on Check Point's FireWall-1 - all in a single volume.
The authors clearly explain the underlying concepts of protection that all security professionals should know. Using a hands-on approach, the authors guide you through the complex process of designing, building, and maintaining firewalls using Check Point's FireWall-1.
Throughout the book, extensive case studies discuss the many security threats to corporate Intranet and Internet sites - and show you how to avoid them using FireWall-1. You'll also find an invaluable CD-ROM that contains an evaluation copy of Check Point's FireWall-1 product, so you can see the benefits of this great product for yourself.
Check Point FireWall-1 Administration Guide is ideal for administrators and professionals who need to install FireWall-1 for Windows and UNIX.
"synopsis" may belong to another edition of this title.
Check Point FireWall-1 is big and highly capable but hard for the uninitiated to figure out. Check Point FireWall-1 Administration Guide does a competent job of scratching the surface of this popular piece of security software. It leaves a lot of questions unanswered--any single volume would have to--but what's here is enough to help you get the software installed and initially configured in all standard situations.
Authors Marcus Goncalves and Steven Brown--Goncalves has a particularly strong reputation as a firewall guru--describe sound practices for formulating security policies, then implementing those policies as FireWall-1 rules. Coverage focuses on Windows NT installations of FireWall-1. Unix gets some attention, but practically all the screen shots show a Microsoft operating system.
The most interesting parts of this book have to do with how FireWall-1 identifies and reacts to specific kinds of attacks. For example, the authors explain how the FireWall-1 INSPECT engine, faced with attempts to overwhelm a protected machine with unresolved connection attempts (a SYN flood), can use SYNDefender Relay or SYNDefender Gateway to intercept or monitor requests and acknowledgments. They typically map packet exchanges with simple but effective transmission diagrams consisting of ASCII characters. The coverage of VPNs involving mobile users and their implementation with SecuRemote also is strong. --David Wall
Topics covered: Firewall rationales, FireWall-1 installation, rule sets, virtual private networks (VPNs), and how FireWall-1 behaves under specific kinds of attacks.
Your Indispensable Guide to Installing and Maintaining Check Point FireWall-1
Check Point Systems, the leader in security solutions and perimeter protection, has created the #1 firewall used in most corporate networks worldwide. If you are an engineer or network administrator, you know how difficult it is to find the facts you need to implement this new technology--and you don't have the time to search through manuals and documentation. With this unique guide, you can find the most current and comprehensive information on Check Point's FireWall-1--all in a single volume.
The authors clearly explain the underlying concepts of protection that all security professional should know. Using a hands-on approach, the authors guide you through the complex process of designing, building, and maintaining firewalls using Check Point's FireWall-1.
Check Point FireWall-1 Administration Guide covers three key aspects of this product:
*FireWall-1 Overview & Configuration, covering firewall technologies, Check Point's Stateful Inspection and FireWall-1 installation and configuration
* Fire Wall-1 Administration, discussing all the topics of a security policy, creating objects used in a security policy, some FireWall-1 advanced security features and Virtual Private Networking
*FireWall-1 Advanced Topics, including Check Point's OPSEC standard, fault tolerance, load balancing and advanced general firewall security topics
Throughout the book, extensive case studies discuss the many security threats to corporate Intranet and Internet sites--and show you how to avoid them using FireWall-1. You'll also find an invaluable CD_ROM that contains an evaluation copy of Check Points's FireWall-1 product, so you can see the benefits of this great product for yourself.
Check Point FireWall-1 Administration Guide is ideal for administrators and professionals who need to install FireWall-1 for Windows and UNIX. It is the single most up-to-date resource for the latest information on firewall security.
"About this title" may belong to another edition of this title.
Shipping:
FREE
Within U.S.A.
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. Pap/Cdr. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # 15676294-6
Quantity: 1 available
Seller: HPB-Red, Dallas, TX, U.S.A.
paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Seller Inventory # S_423729951
Quantity: 1 available
Seller: Hay-on-Wye Booksellers, Hay-on-Wye, HEREF, United Kingdom
Condition: Very Good. The books cover is in very good condition with small scuffs and scratches. The content is in very good condition with light foxing to the outer edges of the textblock. Seller Inventory # HP-103580
Quantity: 1 available