Amazon Price: $59.99 $47.46 You save: $12.53 (21%) (as of February 27, 2020 03:08 –
"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from your own mistakes–let PhoneBoy show you the right way to manage your FireWall-1 NG infrastructure."
–Tina Bird, Computer Security Officer, Stanford University
"Dameon has taken his original definitive guide and updated it thoroughly for NG. No other book is informed by his depth of experience with Check Point. Accept no substitutes!"
–Matthew Gast, author of 802.11 Wireless Networks: The Definitive Guide
Continue reading “Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide”
Amazon Price: $44.99 $24.44 You save: $20.55 (46%) (as of February 27, 2020 01:11 –
Check Point Firewall-1aA A is the world's leading firewall – but it's extremely difficult to find in-depth, independent guidance on using it effectively. In this book, the maintainer of the world's leading Firewall-1aA A FAQ brings together comprehensive, expert guidance on every aspect of working with Firewall-1aA A : planning, configuration, deployment, administration, tuning, and troubleshooting. In this book, Daemon Welch draws upon his extensive hands-on experience in teaching and implementing Firewall-1aA A in a wide variety of corporate environments. He begins with a practical overview of firewall security, and what a firewall can and can't do. Welch covers planning your Firewall-1aA A installation, building your "rulebase," configuring Firewall-1, logging and alerting, remote management, authentication and passwords, content security, network address translation (NAT), encryption, high availability, performance tuning, and much more. The book contains detailed coverage of VPNs, including client-to-firewall VPNs, the VPN-1 SecuRemote Secure Virtual Network Architecture, secure clients, and VPN troubleshooting.Along the way, Welch provides practical rules and checklists that can't be found anywhere else. For all computer security specialists, network/Web professionals, and system administrators, and for super-power users responsible for protecting computer systems against intrusion.