Checkpoint Next Generation Security Administration

個数:
電子版価格
¥8,961
  • 電書あり

Checkpoint Next Generation Security Administration

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 800 p.
  • 言語 ENG
  • 商品コード 9781928994749
  • DDC分類 005.8

Full Description


Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations.CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems. CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC ResearchOver 29,000 IT professionals are CheckPont Certified This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand!

Contents

Chapter 1Chapter 2: Installing and Configuring VPN-1/FireWall-1 Next GenerationChapter 3: Using the Graphical InterfaceChapter 4: Creating a Security PolicyChapter 5: Applying Network Address TranslationChapter 6: Authenticating UsersChapter 7: Open Security (OPSEC) and Content FilteringChapter 8: Managing Policies and LogsChapter 9: Tracking and AlertsChapter 10: Configuring Virtual Private NetworksChapter 11: Securing Remote ClientsChapter 12: Advanced Configurations