Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide

Essential Checkpoint Firewall-1: An Installation, Configuration, and Troubleshooting Guide

List Price: $44.99
Your Price:
Product Info Reviews

<< 1 2 3 >>

Rating: 5 stars
Summary: Essential more than describes this book
Review: If you are considering buying any guide for Check Point Firewall-1 NG buy this one first and forget the rest.

Don't let the author's "phoneboy" aka make you think twice. This is one of the best guides I have ever read. Most are dry boring and overly technical. This guide is a very easy read, it is well written and to the point and covers all aspects of Check Point Fire Wall thoroughly.

Welch-Abernathy has taken great care to present installation, configuration and troubleshooting in a manner anyone will understand, whether you are seasoned pro or just getting started. He has covered all OS models and taken many of the trobleshooting questions from his site FAQs at www.phoneboy.com and shown examples of how to understand and correct them. In addition to actual Q and A, he outlines the step by step sample configurations excellently with actual scripts, screenshots, notes and diagrams.

Welch-Abernathy also guides you through creating network structures on a scale that allows someone new to Check Point to design and impliment smallto medium network configurations in easy to manage ways.

The author starts out buy giving a great overview of firewall security technologies and there relation to OS Models while comparing the benifits and short comings of both.

Welch-Abernathy then guides you through the installation and developing your rule base. He includes tables and charts to show examples of each and backs up his examples with the most common Q&As making an installation seem like a breeze.

The authors explanation of remote access, NAT and high availability servers don't get any simpler. Any Admin who needs load balancing and fail over on a server cluster should keep this
guide around for refferance as well as daily use.

In addition to the main body of knowledge Welch-Abernathy also includes a great appendex covering OS Bastion security that is not only simple it is direct as well. Also included in the Appendices are a use policy template, ldap configuration, fine tuning for performance and two pages of concrete internet resources.

The author starts out buy giving a great overview of firewall security technologies and there relation to OS Models while comparing the benifits and short comings of both. I also found his overview and specifics of the licensing to be very helpfull.

Welch-Abernathy then guides you through maze of the installation process and developing your rule base. He includes tables and charts to show examples of each and backs up his examples with the most common Q&As making an installation seem like a breeze.

His examples of authentication, encyption and vpn make this a must read for anyone running Check Point on a corpoarte network.

I also found his overview and specifics of the licensing to be very helpfull as well.

If you are running Check Point Firewall-1 or considering using Check Point Firewall-1 you won't go wrong by putting this one in your library.

Rating: 5 stars
Summary: Essential more than describes this book
Review: If you are considering buying any guide for Check Point Firewall-1 NG buy this one first and forget the rest.

Don't let the author's "phoneboy" aka make you think twice. This is one of the best guides I have ever read. Most are dry boring and overly technical. This guide is a very easy read, it is well written and to the point and covers all aspects of Check Point Fire Wall thoroughly.

Welch-Abernathy has taken great care to present installation, configuration and troubleshooting in a manner anyone will understand, whether you are seasoned pro or just getting started. He has covered all OS models and taken many of the trobleshooting questions from his site FAQs at www.phoneboy.com and shown examples of how to understand and correct them. In addition to actual Q and A, he outlines the step by step sample configurations excellently with actual scripts, screenshots, notes and diagrams.

Welch-Abernathy also guides you through creating network structures on a scale that allows someone new to Check Point to design and impliment smallto medium network configurations in easy to manage ways.

The author starts out buy giving a great overview of firewall security technologies and there relation to OS Models while comparing the benifits and short comings of both.

Welch-Abernathy then guides you through the installation and developing your rule base. He includes tables and charts to show examples of each and backs up his examples with the most common Q&As making an installation seem like a breeze.

The authors explanation of remote access, NAT and high availability servers don't get any simpler. Any Admin who needs load balancing and fail over on a server cluster should keep this
guide around for refferance as well as daily use.

In addition to the main body of knowledge Welch-Abernathy also includes a great appendex covering OS Bastion security that is not only simple it is direct as well. Also included in the Appendices are a use policy template, ldap configuration, fine tuning for performance and two pages of concrete internet resources.

The author starts out buy giving a great overview of firewall security technologies and there relation to OS Models while comparing the benifits and short comings of both. I also found his overview and specifics of the licensing to be very helpfull.

Welch-Abernathy then guides you through maze of the installation process and developing your rule base. He includes tables and charts to show examples of each and backs up his examples with the most common Q&As making an installation seem like a breeze.

His examples of authentication, encyption and vpn make this a must read for anyone running Check Point on a corpoarte network.

I also found his overview and specifics of the licensing to be very helpfull as well.

If you are running Check Point Firewall-1 or considering using Check Point Firewall-1 you won't go wrong by putting this one in your library.

Rating: 5 stars
Summary: One of the Best Books about FW-1
Review: It does not have everything. But it has a lot.
Probably the best book about FW-1.

Rating: 5 stars
Summary: Best CheckPoint FW-1 Book Ever!!!!!!!!!!!!!!!
Review: Mr. Welch, aka "PhoneBoy", moves from strength to strength, with this book. If you are new to CheckPoint FW-1: buy this book. If you currently use CheckPoint FW-1: buy this book. "PhoneBoy", did not just write, this book, he has been writing this book -- through his massive FW-1 FAQ -- for some time. Hence, the quality of this work is beyond that of a mere 'book' in the common sense and traditional view.

Dameon really shows his experience, and cuts right to the heart of _all_ the critical issues covered. Most 'computer' books (besides TCP/IP Illustrated (1,2&3) , O'Really Unix & a few Worx Press books) are total lame, marketing-slick filled tripe; as we all know that's why we have jobs ;)

Most Tech books are made by Cor(e)Pirate losers who listen to some wanker pitch lame re-Hashes of the already subpar vendor docs (& Web site slicks). This book, on the other hand, is a high quality Tome, guaranteed to be an overnight 'classic', in the feild. Visit, the Web site of the Master, his nickname .com, or that of the publisher AW to get a .PDF version of Chap 9, this is the VPN Chap and, as stated in a review here, one of the strongest Chaps in the book. Actually, all the chapters are strong, it's just that VPNs within the CheckPoint context are very important, and can be complex. If manuals are fine, its time to Read This new Fine Manual for CheckPoint FW-1.

With this book and a copy of the FW-1 GUI run *local, you could pass the CCSA and CCSE: without ever actually touching a real CheckPoint FW-1 install.

CheckPoint should ship this with every firewall they sell, that's how good this book is!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Rating: 5 stars
Summary: Best CheckPoint FW-1 Book Ever!!!!!!!!!!!!!!!
Review: Mr. Welch, aka "PhoneBoy", moves from strength to strength, with this book. If you are new to CheckPoint FW-1: buy this book. If you currently use CheckPoint FW-1: buy this book. "PhoneBoy", did not just write, this book, he has been writing this book -- through his massive FW-1 FAQ -- for some time. Hence, the quality of this work is beyond that of a mere 'book' in the common sense and traditional view.

Dameon really shows his experience, and cuts right to the heart of _all_ the critical issues covered. Most 'computer' books (besides TCP/IP Illustrated (1,2&3) , O'Really Unix & a few Worx Press books) are total lame, marketing-slick filled tripe; as we all know that's why we have jobs ;)

Most Tech books are made by Cor(e)Pirate losers who listen to some wanker pitch lame re-Hashes of the already subpar vendor docs (& Web site slicks). This book, on the other hand, is a high quality Tome, guaranteed to be an overnight 'classic', in the feild. Visit, the Web site of the Master, his nickname .com, or that of the publisher AW to get a .PDF version of Chap 9, this is the VPN Chap and, as stated in a review here, one of the strongest Chaps in the book. Actually, all the chapters are strong, it's just that VPNs within the CheckPoint context are very important, and can be complex. If manuals are fine, its time to Read This new Fine Manual for CheckPoint FW-1.

With this book and a copy of the FW-1 GUI run *local, you could pass the CCSA and CCSE: without ever actually touching a real CheckPoint FW-1 install.

CheckPoint should ship this with every firewall they sell, that's how good this book is!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Rating: 5 stars
Summary: Phoneboy's best FAQ yet
Review: Phoneboy hits a home run with this solution-filled engineer's guide to the Check Point FireWall-1 software package.

This is the book that the industry has been begging for as it fills in the gaps that everyone who uses FireWall-1 need to know about.

As a Certified Check Point Instructor, I recommend this book to all of my students who attend any of my classes, as this book gets down deeper than any other book on FireWall-1 to-date.

Highly recommended and easy to read. Novice and expert alike will learn more than he or she knows what to do with.

Rating: 5 stars
Summary: The Best Checkpoint Reference on the Market
Review: Phoneboy's web site is already the first place to check for Firewall 1 issues. When we heard he was publishing a book, we immediately bought it. This book is the most comprehensive, complete, and accurate technical reference on Checkpoint Firewall 1. If you are running Checkpoint, this HAS to be in your library. There is a reference to every problem and tweak we have ever had to do, plus some we are going to do after reading this book. Checkpoint's Technical support is expensive and horrible, so this book gives you all the info you need to run a stable and secure Firewall. This book contains screenshots, and step by step instructions for everything you need relating to Firewall 1.

Rating: 5 stars
Summary: Lives up to its title!
Review: This is one of those rare books that delivers what the title claims. It gives in-depth instructions on Firewall-1 installation, configuration and troubleshooting, and also includes additional material on security and networking that goes beyond what the title promises.

What I especially liked about this book are the little details that have a big impact if they're overlooked. Notable examples include:

(1) Quick, but thorough, introduction that provides an overview of firewalls at a general level, and the key features and benefits of Firewall-1 in particular.
(2) Issues, such the need for a security policy, are addressed early on. This is an important consideration and the author goes beyond merely highlighting the need by giving you a brief template to use in creating one.
(3) Guide through the labyrinth of Check Point's Firewall-1 licensing schemes - this is a nice touch because mastering the technology is a less daunting task then figuring out Check Point's sales strategy.
(4) Strengths and weaknesses of candidate operating systems, and a straightforward process for installing and configuring Firewall-1. The latter is a strong point because you'll benefit from the author's extensive experience and will save time by having a strategy instead of getting bit by obscure issues and learning painful lessons.

I like the way that each section ends with frequently asked questions. The author anticipates and answers common questions about installation, configuration and troubleshooting. Because of the way this book is structured it can serve as an off-the-shelf implementation and maintenance guide, eliminating the need to develop this material in-house.

This is one of the best written and well thought-out technical guides that I've had the pleasure of reading. It sets a high standard for similar books, but more importantly, it so completely covers Firewall-1 that you won't need anything but this book to implement and support this product.

Rating: 5 stars
Summary: Lives up to its title!
Review: This is one of those rare books that delivers what the title claims. It gives in-depth instructions on Firewall-1 installation, configuration and troubleshooting, and also includes additional material on security and networking that goes beyond what the title promises.

What I especially liked about this book are the little details that have a big impact if they're overlooked. Notable examples include:

(1) Quick, but thorough, introduction that provides an overview of firewalls at a general level, and the key features and benefits of Firewall-1 in particular.
(2) Issues, such the need for a security policy, are addressed early on. This is an important consideration and the author goes beyond merely highlighting the need by giving you a brief template to use in creating one.
(3) Guide through the labyrinth of Check Point's Firewall-1 licensing schemes - this is a nice touch because mastering the technology is a less daunting task then figuring out Check Point's sales strategy.
(4) Strengths and weaknesses of candidate operating systems, and a straightforward process for installing and configuring Firewall-1. The latter is a strong point because you'll benefit from the author's extensive experience and will save time by having a strategy instead of getting bit by obscure issues and learning painful lessons.

I like the way that each section ends with frequently asked questions. The author anticipates and answers common questions about installation, configuration and troubleshooting. Because of the way this book is structured it can serve as an off-the-shelf implementation and maintenance guide, eliminating the need to develop this material in-house.

This is one of the best written and well thought-out technical guides that I've had the pleasure of reading. It sets a high standard for similar books, but more importantly, it so completely covers Firewall-1 that you won't need anything but this book to implement and support this product.

Rating: 5 stars
Summary: Great book
Review: This is the best book on firewall-1 that I have read. The author knows the product and can explain each setting clearly. This is a must have for anyone studying for CCSA or learning firewall-1...


<< 1 2 3 >>

© 2004, ReviewFocus or its affiliates