Saved in:
Main Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Rockland, MA
Syngress Pub.
2005
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597490313/?ar |
Summary: | Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. |
Item Description: | Print version record |
Physical Description: | 1 online resource (xxx, 625) illustrations |
ISBN: | 1423754298 9781423754299 0080488560 9780080488561 9781597490313 1597490318 1281035572 9781281035578 9786611035570 6611035575 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047646950 | ||
003 | DE-627-1 | ||
005 | 20240228114002.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2005 xx |||||o 00| ||eng c | ||
020 | |a 1423754298 |c electronic bk. |9 1-4237-5429-8 | ||
020 | |a 9781423754299 |c electronic bk. |9 978-1-4237-5429-9 | ||
020 | |a 0080488560 |9 0-08-048856-0 | ||
020 | |a 9780080488561 |9 978-0-08-048856-1 | ||
020 | |a 9781597490313 |9 978-1-59749-031-3 | ||
020 | |a 1597490318 |9 1-59749-031-8 | ||
020 | |a 1281035572 |9 1-281-03557-2 | ||
020 | |a 9781281035578 |9 978-1-281-03557-8 | ||
020 | |a 9786611035570 |9 9786611035570 | ||
020 | |a 6611035575 |9 6611035575 | ||
035 | |a (DE-627-1)047646950 | ||
035 | |a (DE-599)KEP047646950 | ||
035 | |a (ORHE)9781597490313 | ||
035 | |a (DE-627-1)047646950 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Stephens, Robert |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Configuring Check Point NGX VPN-1/FireWall-1 |c Robert Stephens, Barry J. Stiefel, Stephen Watkins |
246 | 3 | 3 | |a Check Point NGX |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c 2005 | |
300 | |a 1 online resource (xxx, 625) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. | ||
546 | |a English. | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Firewalls (Computer security) | |
650 | 4 | |a FireWall-1 | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Coupe-feu (Sécurité informatique) | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Firewalls (Computer security) | |
650 | 4 | |a Computer networks ; Security measures ; Computer programs | |
650 | 4 | |a Computer security ; Computer programs | |
650 | 4 | |a Extranets (Computer networks) | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Firewalls (Computer security) | |
700 | 1 | |a Stiefel, Barry J. |e MitwirkendeR |4 ctb | |
700 | 1 | |a Watkins, Stephen |e MitwirkendeR |4 ctb | |
776 | 1 | |z 1597490318 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597490318 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597490313/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047646950 |
---|---|
_version_ | 1833357073766678528 |
adam_text | |
any_adam_object | |
author | Stephens, Robert |
author2 | Stiefel, Barry J. Watkins, Stephen |
author2_role | ctb ctb |
author2_variant | b j s bj bjs s w sw |
author_facet | Stephens, Robert Stiefel, Barry J. Watkins, Stephen |
author_role | aut |
author_sort | Stephens, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047646950 (DE-599)KEP047646950 (ORHE)9781597490313 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02899cam a22007212c 4500</leader><controlfield tag="001">ZDB-30-ORH-047646950</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114002.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2005 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1423754298</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-4237-5429-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781423754299</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-4237-5429-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080488560</subfield><subfield code="9">0-08-048856-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080488561</subfield><subfield code="9">978-0-08-048856-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490313</subfield><subfield code="9">978-1-59749-031-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490318</subfield><subfield code="9">1-59749-031-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281035572</subfield><subfield code="9">1-281-03557-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281035578</subfield><subfield code="9">978-1-281-03557-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611035570</subfield><subfield code="9">9786611035570</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611035575</subfield><subfield code="9">6611035575</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047646950</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597490313</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047646950</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stephens, Robert</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Configuring Check Point NGX VPN-1/FireWall-1</subfield><subfield code="c">Robert Stephens, Barry J. Stiefel, Stephen Watkins</subfield></datafield><datafield tag="246" ind1="3" ind2="3"><subfield code="a">Check Point NGX</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxx, 625)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">FireWall-1</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coupe-feu (Sécurité informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Computer programs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Extranets (Computer networks)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Firewalls (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stiefel, Barry J.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Watkins, Stephen</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1597490318</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597490318</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597490313/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047646950 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:54Z |
institution | BVB |
isbn | 1423754298 9781423754299 0080488560 9780080488561 9781597490313 1597490318 1281035572 9781281035578 9786611035570 6611035575 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xxx, 625) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Stephens, Robert VerfasserIn aut Configuring Check Point NGX VPN-1/FireWall-1 Robert Stephens, Barry J. Stiefel, Stephen Watkins Check Point NGX Rockland, MA Syngress Pub. 2005 1 online resource (xxx, 625) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record Check Point NGX VPN-1/Firewall-1 is the major release of Check Point's flagship firewall software product. Many of the features focus on how to configure and manage Dynamic Routing rules, which are essential to keeping an enterprise network both available and secure. This book deals with the subject, Check Point. English. Computer networks Security measures Firewalls (Computer security) FireWall-1 Réseaux d'ordinateurs ; Sécurité ; Mesures Coupe-feu (Sécurité informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs Computer security ; Computer programs Extranets (Computer networks) Computer networks ; Security measures Stiefel, Barry J. MitwirkendeR ctb Watkins, Stephen MitwirkendeR ctb 1597490318 Erscheint auch als Druck-Ausgabe 1597490318 |
spellingShingle | Stephens, Robert Configuring Check Point NGX VPN-1/FireWall-1 Computer networks Security measures Firewalls (Computer security) FireWall-1 Réseaux d'ordinateurs ; Sécurité ; Mesures Coupe-feu (Sécurité informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs Computer security ; Computer programs Extranets (Computer networks) Computer networks ; Security measures |
title | Configuring Check Point NGX VPN-1/FireWall-1 |
title_alt | Check Point NGX |
title_auth | Configuring Check Point NGX VPN-1/FireWall-1 |
title_exact_search | Configuring Check Point NGX VPN-1/FireWall-1 |
title_full | Configuring Check Point NGX VPN-1/FireWall-1 Robert Stephens, Barry J. Stiefel, Stephen Watkins |
title_fullStr | Configuring Check Point NGX VPN-1/FireWall-1 Robert Stephens, Barry J. Stiefel, Stephen Watkins |
title_full_unstemmed | Configuring Check Point NGX VPN-1/FireWall-1 Robert Stephens, Barry J. Stiefel, Stephen Watkins |
title_short | Configuring Check Point NGX VPN-1/FireWall-1 |
title_sort | configuring check point ngx vpn 1 firewall 1 |
topic | Computer networks Security measures Firewalls (Computer security) FireWall-1 Réseaux d'ordinateurs ; Sécurité ; Mesures Coupe-feu (Sécurité informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs Computer security ; Computer programs Extranets (Computer networks) Computer networks ; Security measures |
topic_facet | Computer networks Security measures Firewalls (Computer security) FireWall-1 Réseaux d'ordinateurs ; Sécurité ; Mesures Coupe-feu (Sécurité informatique) COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer networks ; Security measures ; Computer programs Computer security ; Computer programs Extranets (Computer networks) Computer networks ; Security measures |
work_keys_str_mv | AT stephensrobert configuringcheckpointngxvpn1firewall1 AT stiefelbarryj configuringcheckpointngxvpn1firewall1 AT watkinsstephen configuringcheckpointngxvpn1firewall1 AT stephensrobert checkpointngx AT stiefelbarryj checkpointngx AT watkinsstephen checkpointngx |