<< 1 >>
Rating:  Summary: Awesome Book. Review: Excellent book. Explains in depth how to build security solutions with VPN-1/FireWall-1 NG and includes FCS, FP1, FP2 and FP3. The authors include diverse scenarios and have obviously extensively used the product. Lot's of useful tips and hints. I would heartily recommend this book for anyone who wants a detailed reference with real world examples and actual step by step examples of VPN-1, Firewall-1, CVP etc.
Rating:  Summary: Total waste of time. Review: I am a CCSA in NG and wanted something to supplement my studies for the CCSE in NG and also help me with my day to day job. So I was excited when this book came out. The technical content is very incorrect in places and simple grammar mistakes are very common. The writing style is just awfull and there is no flow in the book whatsoever. All this book does is server to confuse. Avoid at all cost!
Rating:  Summary: Not really useful Review: Interesting Book. There are theory chapters in here that seem just background but the Chapter on CVP, VPN and the installation chapters are better than any other Check Point book I have purchased. The installation chapters cover virtually all operating systems. I also liked the coverage of differences between Feature Pack releases and found the appendixes useful. Overall, I would recommend the book if you are looking to actually use the product in your day job.
Rating:  Summary: Great book Review: Superb for installing and configuring VPN-1/FireWall-1 NG, contains lots of real-world examples. Covers just about everything you need to know, including content security, remote access VPN, SecureClient and Policy Server. The book is obviously written by techies who use the product extensively. Anyone using VPN-1/FireWall-1 NG should have this book on their shelves.
Rating:  Summary: Good Book Review: The book covers security principles and applies them to Firewall-1. It has some good tips and shows how the underlying technology does the job. Although the book is difficult to navigate there is some really useful information in there. In a number of places the book corrects the Check Point documentation and gives further insight into the low level configuration that is seriously lacking in the Check Point manuals.
Rating:  Summary: Great history of the Internet, poor coverage of subject Review: This book is a poor rehash of existing documentation. The installation chapters provide little or no additional insight, and closely resemble the available product documentation.It does, however, provide in the first chapter a great history of the internet, and a primer on TCP/IP. For people wanting to learn how Checkpoint works, there is no overview or description of what all the moving parts are, and there really isn't any sstep-by-step help that isn't already accessable via product documentation. In short, if you need a book to give you insight, assistance or instruction on setting up a Check Point Firewall like I did (above and beyond the documents that accompany FW-1 or your firewall appliance) this isn't the book to get.
Rating:  Summary: Not really useful Review: This is an OK book if you have zero knowledge of CheckPoint products. If you're actively admin'ing an NG FW-1, please spend your money on a better books, as you'll end up being frustrated by the seemingly randomness of this book. As an example, topics about licensing are non-existant. Those who admin FW-1 know the nightmare of CheckPoint licensing, which in reality could be discussed in an entire chapter of it's own.
<< 1 >>
|