Check Point Firewall-1aA A is the world's leading firewall - but it's extremely difficult to find in-depth, independent guidance on using it effectively. In this book, the maintainer of the world's leading Firewall-1aA A FAQ brings together comprehensive, expert guidance on every aspect of working with Firewall-1aA A : planning, configuration, deployment, administration, tuning, and troubleshooting. In this book, Daemon Welch draws upon his extensive hands-on experience in teaching and implementing Firewall-1aA A in a wide variety of corporate environments. He begins with a practical overview of firewall security, and what a firewall can and can't do. Welch covers planning your Firewall-1aA A installation, building your "rulebase," configuring Firewall-1, logging and alerting, remote management, authentication and passwords, content security, network address translation (NAT), encryption, high availability, performance tuning, and much more. The book contains detailed coverage of VPNs, including client-to-firewall VPNs, the VPN-1 SecuRemote Secure Virtual Network Architecture, secure clients, and VPN troubleshooting.Along the way, Welch provides practical rules and checklists that can't be found anywhere else. For all computer security specialists, network/Web professionals, and system administrators, and for super-power users responsible for protecting computer systems against intrusion.
"synopsis" may belong to another edition of this title.
Dameon D. Welch-Abernathy, a.k.a. "PhoneBoy," has been supporting, deploying, and teaching Check Point™ FireWall-1® since 1996. He has assisted and instructed thousands of network professionals and currently maintains the largest industry FAQ site on FireWall-1® NG at http://blog.phoneboy.com/. Dameon works for Product Line Support at Nokia.
“Dameon’s knowledge of FireWall-1, which in many cases has surpassed the knowledge of Check Point’s own engineers, hasalways impressed me. This book is yet another proof of Dameon’sdeep understanding of FireWall-1’s internals as well as itsimplementation methodologies. I strongly recommend this book to anyFireWall-1 user who wishes to master the product.”
―Nir Zuk,CTO, OneSecure, Inc. Formerly, Principal Engineer at Check PointSoftware
“This book is a fabulous resource for running FireWall-1reliably and securely. It’s the single best source ofinformation I’ve ever seen on how to map security and businessrequirements into FW-1 rules and configurations. The hordes of sampleconfigurations are the best way to demonstrate the advice andexplanations in practice. If you’re using FireWall-1, you needthis book.”
―Tina Bird, Security Architect at CounterpaneInternetSecurity and moderator of the Virtual Private Networks mailinglist
“FireWall-1 is a critical security application, more widelyused than any other by far, that relies on proper configuration andusage to be effective. Dameon’s book can be counted as thedefinitive reference―required reading for anyone using CheckPoint’s FireWall-1 security software.”
―Kelly Robertson,Senior Sales Engineering Manager for Nokia InternetCommunications
Packed with practical, hands-on techniques, thisinsider’s guide explains how to build, implement, and maintainthe world’s best-selling firewall product, Check PointFireWall-1. Featuring tools, tips, and checklists not found in othersources, the book brings manageability, reliability, and efficiency totoday’s standalone or distributed networks.
Essential Check Point FireWall-1™ coversevery major feature of the product providing working solutions toreal-world situations. Filled with screen shots and sampleconfigurations, the book features step-by-step instructions that canbe replicated on standard equipment easily. Developed through years ofactual product support, this guidebook is an invaluable resource fornetwork professionals working on UNIX or Windows NT platforms.
Key coverage includes:
Authoritative andpractical, this comprehensive guidebook provides real-world solutionsand techniques necessary for planning, installing, and deploying theworld’s leading firewall product.
"About this title" may belong to another edition of this title.
£ 3.95 shipping within United Kingdom
Destination, rates & speeds£ 32.65 shipping from U.S.A. to United Kingdom
Destination, rates & speedsSeller: Godley Books, Hyde, United Kingdom
Soft Cover. Condition: Fine. No marks or inscriptions. No creasing to covers or to spine. A very clean very tight copy with bright unmarked boards and no bumping to corners. 519pp. This insider's guide explains how to build, implement and maintain Check Point FireWall-1. We do not use stock photos, the picture displayed is of the actual book for sale. Every one of our books is in stock in the UK ready for immediate delivery. Size: 9.25 x 7.25 inches. Seller Inventory # 025783
Quantity: 1 available
Seller: Better World Books, Mishawaka, IN, U.S.A.
Condition: Very Good. 1st. Used book that is in excellent condition. May show signs of wear or have minor defects. Seller Inventory # GRP76446658
Quantity: 2 available
Seller: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condition: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.8. Seller Inventory # G0201699508I3N00
Quantity: 1 available
Seller: SecondSale, Montgomery, IL, U.S.A.
Condition: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00034882805
Quantity: 1 available
Seller: GridFreed, North Las Vegas, NV, U.S.A.
Paperback. Condition: New. In shrink wrap. Seller Inventory # 10-01237
Quantity: 1 available
Seller: The Book Spot, Sioux Falls, MN, U.S.A.
Paperback. Condition: New. Seller Inventory # Abebooks35869
Quantity: 1 available