Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a22005177a 4500 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    220820s2022    enk     o     000 0 eng d 
020    9781801077149|q(electronic bk.) 
020    1801077142 
029 1  AU@|b000072719434 
035    (OCoLC)1341443102 
037    10163588|bIEEE 
040    EBLCP|beng|epn|cEBLCP|dORMDA|dOCLCQ|dOCLCF|dOCLCQ|dN$T
       |dIEEEE|dOCLCO 
049    INap 
082 04 658.4/78 
082 04 658.4/78|223 
099    eBook O'Reilly for Public Libraries 
100 1  Yakovlev, Vladimir. 
245 10 Check Point Firewall Administration R81. 10+ :|ba 
       Practical Guide to Check Point Firewall Deployment and 
       Administration /|cVladimir Yakovlev ; foreword by Dameon 
       D. Welch.|h[O'Reilly electronic resource] 
250    1st edition. 
260    Birmingham :|bPackt Publishing, Limited,|c2022. 
300    1 online resource (654 pages) 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
505 0  Table of Contents Introduction to Check Point Firewalls 
       and Threat Prevention Products Common Deployment Scenarios
       and Network Segmentation Building a Check Point Lab 
       Environment - Part 1 Building a Check Point Lab 
       Environment - Part 2 Gaia OS, the First Time Configuration
       Wizard, and an Introduction to the Gaia Portal (WebUI) 
       Check Point Gaia Command-Line Interface; Backup and 
       Recovery Methods; CPUSE SmartConsole - Familiarization and
       Navigation Introduction to Policies, Layers, and Rules 
       Working with Objects - ICA, SIC, Managed, Static, and 
       Variable Objects Working with Network Address Translation 
       Building Your First Policy Configuring Site-to-Site and 
       Remote Access VPNs Introduction to Logging and SmartEvent 
       Working with ClusterXL High Availability Performing Basic 
       Troubleshooting. 
520    Improve your organization's security posture by performing
       routine administration tasks flawlessly Key Features Get a
       gradual and practical introduction to Check Point 
       firewalls Acquire the knowledge and skills necessary for 
       effective firewall administration, maintenance, and 
       troubleshooting Create and operate a lab environment with 
       gradually increasing complexity to practice firewall 
       administration skills Book Description Check Point 
       firewalls are the premiere firewalls, access control, and 
       threat prevention appliances for physical and virtual 
       infrastructures. With Check Point's superior security, 
       administrators can help maintain confidentiality, 
       integrity, and the availability of their resources 
       protected by firewalls and threat prevention devices. This
       hands-on guide covers everything you need to be fluent in 
       using Check Point firewalls for your operations. This book
       familiarizes you with Check Point firewalls and their most
       common implementation scenarios, showing you how to deploy
       them from scratch. You will begin by following the 
       deployment and configuration of Check Point products and 
       advance to their administration for an organization. Once 
       you've learned how to plan, prepare, and implement Check 
       Point infrastructure components and grasped the 
       fundamental principles of their operation, you'll be 
       guided through the creation and modification of access 
       control policies of increasing complexity, as well as the 
       inclusion of additional features. To run your routine 
       operations infallibly, you'll also learn how to monitor 
       security logs and dashboards. Generating reports detailing
       current or historical traffic patterns and security 
       incidents is also covered. By the end of this book, you'll
       have gained the knowledge necessary to implement and 
       comfortably operate Check Point firewalls. What you will 
       learn Understand various Check Point implementation 
       scenarios in different infrastructure topologies Perform 
       initial installation and configuration tasks using Web UI 
       and the CLI Create objects of different categories and 
       types Configure different NAT options Work with access 
       control policies and rules Use identity awareness to 
       create highly granular rules Operate high-availability 
       clusters Who this book is for Whether you're new to Check 
       Point firewalls or looking to catch up with the latest 
       R81.10++ releases, this book is for you. Although intended
       for information/cybersecurity professionals with some 
       experience in network or IT infrastructure security, IT 
       professionals looking to shift their career focus to 
       cybersecurity will also find this firewall book useful. 
       Familiarity with Linux and bash scripting is a plus. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
630 00 FireWall-1. 
630 07 FireWall-1|2fast 
650  0 Computer networks|xSecurity measures|xComputer programs. 
650  0 Computer security|xComputer programs. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures|xLogiciels. 
650  6 Sécurité informatique|xLogiciels. 
650  7 Computer networks|xSecurity measures|xComputer programs
       |2fast 
650  7 Computer security|xComputer programs|2fast 
700 1  Welch, Dameon D. 
776 08 |iPrint version:|aYakovlev, Vladimir.|tCheck Point 
       Firewall Administration R81. 10+.|b1st edition.
       |dBirmingham : Packt Publishing, Limited, 2022
       |z9781801077149 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781801072717/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    ProQuest Ebook Central|bEBLB|nEBL7072613 
938    EBSCOhost|bEBSC|n3356907 
994    92|bJFN