Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nokia Network Security Solutions Handbook

Buy
The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are discussed in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the high-availability configuration that is Nokia's strength. The appendixes include coverage of the UNIX basics which lie at the heart of the appliance's IPSO operating system, and a review of the other packages available for Nokia systems (such as Perl and Bash).

The only book that shows network professionals how to configure and administer Nokia's newest, most popular security hardware and software products.

This book was written with the network and firewall administrator in mind. Throughout, we have tried to concentrate on the day-to-day tasks that administrators must perform and to give the book a practical focus. Our hope is that you find this book useful enough to keep a dog-eared copy on your shelf to refer to as the need arises.Where it is appropriate and enhances understanding, we explain underlying concepts so that perhaps the reference will become less necessary with time. Although an understanding of UNIX is helpful as you read this book, it is not necessary; to help you get up to speed, Appendix A presents a gentle introduction to the concepts and tools involved.The contents of this appendix should be all you need to make the most out of the chapters that stray from the Voyager interface and into the command line.

About the Author
Cherie Amon (CCSI) is both a Check Point and Nokia Certified Security Instructor and has been installing, configuring and supporting Check Point products since 1997. Cherie is also the Technical Editor and co-author of Check Point Next Generation Security Administration (Syngress Publishing, ISBN: 1-928994-74-1).

Doug Maxwell (CCSI, NSA) is a Senior Professional Services Engineer with Integralis. Doug was a contributing author for Check Point Next Generation Security Administration (Syngress Publishing, ISBN: 1-928994-74-1).

(HTML tags aren't allowed.)

Beginning Mac OS X Programming
Beginning Mac OS X Programming

Beginning Mac OS X Programming

Every Mac OS X system comes with all the essentials required for programming: free development tools, resources, and utilities. However, finding the place to begin may be challenging, especially if you have no prior development knowledge. This comprehensive guide offers you an ideal starting point to...

PC Magazine Linux Solutions
PC Magazine Linux Solutions
So you've decided to find out about Linux.

Who better to fill you in than PC Magazine?

If you can imagine something you'd like your computer to do, you can probably do it with versatile, economical, powerful Linux. Here's how to tap that power, from installation to Linux desktop environments...

Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...

Volume 6b: Motif Reference Manual, 2nd Edition
Volume 6b: Motif Reference Manual, 2nd Edition
Volume 6B, Motif Reference Manual, is a complete programmer's reference for the Motif toolkit. The Motif toolkit provides a complete set of widgets, such as buttons, scroll bars, menus, and dialog boxes, for developing graphical user interfaces. It also includes a library of functions for creating and manipulating those widgets. The second...
Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy