| The Nokia Network Security Solutions Handbook introduces readers to both the basics and the finer points of administering, configuring, and securing the Nokia IP-series hardware appliances. It introduces readers to the different hardware models and covers the features associated with each. Installation and setup are discussed in detail, as well as installation and configuration of the Check Point firewall on the Nokia system. Readers will learn basic system administration, security, and monitoring before moving into advanced system administration concepts, as well as how to use Nokia's command line interface. Routing configurations and the different protocols involved are covered in detail, finishing off with a comprehensive discussion of the high-availability configuration that is Nokia's strength. The appendixes include coverage of the UNIX basics which lie at the heart of the appliance's IPSO operating system, and a review of the other packages available for Nokia systems (such as Perl and Bash).
The only book that shows network professionals how to configure and administer Nokia's newest, most popular security hardware and software products.
This book was written with the network and firewall administrator in mind. Throughout, we have tried to concentrate on the day-to-day tasks that administrators must perform and to give the book a practical focus. Our hope is that you find this book useful enough to keep a dog-eared copy on your shelf to refer to as the need arises.Where it is appropriate and enhances understanding, we explain underlying concepts so that perhaps the reference will become less necessary with time. Although an understanding of UNIX is helpful as you read this book, it is not necessary; to help you get up to speed, Appendix A presents a gentle introduction to the concepts and tools involved.The contents of this appendix should be all you need to make the most out of the chapters that stray from the Voyager interface and into the command line.
About the Author Cherie Amon (CCSI) is both a Check Point and Nokia Certified Security Instructor and has been installing, configuring and supporting Check Point products since 1997. Cherie is also the Technical Editor and co-author of Check Point Next Generation Security Administration (Syngress Publishing, ISBN: 1-928994-74-1).
Doug Maxwell (CCSI, NSA) is a Senior Professional Services Engineer with Integralis. Doug was a contributing author for Check Point Next Generation Security Administration (Syngress Publishing, ISBN: 1-928994-74-1). |
|
|
Beginning Mac OS X ProgrammingBeginning Mac OS X Programming
Every Mac OS X system comes with all the essentials required for programming: free development tools, resources, and utilities. However, finding the place to begin may be challenging, especially if you have no prior development knowledge. This comprehensive guide offers you an ideal starting point to... | | PC Magazine Linux SolutionsSo you've decided to find out about Linux.
Who better to fill you in than PC Magazine?
If you can imagine something you'd like your computer to do, you can probably do it with versatile, economical, powerful Linux. Here's how to tap that power, from installation to Linux desktop environments... | | Raspberry Pi Blueprints
Design and build your own hardware projects that interact with the real world using the Raspberry Pi
About This Book
-
Interact with a wide range of additional sensors and devices via Raspberry Pi
-
Create exciting, low-cost products ranging from radios to home security and weather...
|
Volume 6b: Motif Reference Manual, 2nd EditionVolume 6B, Motif Reference Manual, is a complete programmer's reference for the Motif toolkit. The Motif toolkit provides a complete set of widgets, such as buttons, scroll bars, menus, and dialog boxes, for developing graphical user interfaces. It also includes a library of functions for creating and manipulating those widgets. The second... | | Use Cases: Requirements in Context, Second EditionThis book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.
Use Cases, Second Edition:... | | |
|