skip to content
UTM security with Fortinet : Mastering FortiOS Preview this item
ClosePreview this item
Checking...

UTM security with Fortinet : Mastering FortiOS

Author: Kenneth Tam
Publisher: [Place of publication not identified] : Syngress, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kenneth Tam
ISBN: 9781597499774 1597499773
OCLC Number: 819506986
Description: 1 online resource : illustrations
Responsibility: Kenneth Tam [and others].

Abstract:

Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/819506986> # UTM security with Fortinet Mastering FortiOS
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "819506986" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1185202714#Place/place_of_publication_not_identified> ; # Place of publication not identified
    schema:about <http://id.worldcat.org/fast/872298> ; # Computer networks--Access control
    schema:about <http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computer_networks_access_control> ; # Computer networks--Access control
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh2007008424> ; # Computer networks--Access control
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/106437260> ; # Kenneth Tam
    schema:datePublished "2013" ;
    schema:description "Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1185202714> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "UTM security with Fortinet Mastering FortiOS"@en ;
    schema:productID "819506986" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/819506986#PublicationEvent/place_of_publication_not_identified_syngress_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1185202714#Agent/syngress> ; # Syngress
    schema:url <http://site.ebrary.com/id/10626278> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=51019> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781597497473> ;
    schema:url <http://app.knovel.com/hotlink/toc/id:kpUTMSFMF4/utm-security-with> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=486625> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597497473> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781597497473> ;
    schema:workExample <http://worldcat.org/isbn/9781597499774> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/819506986> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1185202714#Place/place_of_publication_not_identified> # Place of publication not identified
    a schema:Place ;
    schema:name "Place of publication not identified" ;
    .

<http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computer_networks_access_control> # Computer networks--Access control
    a schema:Intangible ;
    schema:name "Computer networks--Access control"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1185202714#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2007008424> # Computer networks--Access control
    a schema:Intangible ;
    schema:name "Computer networks--Access control"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872298> # Computer networks--Access control
    a schema:Intangible ;
    schema:name "Computer networks--Access control"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://viaf.org/viaf/106437260> # Kenneth Tam
    a schema:Person ;
    schema:familyName "Tam" ;
    schema:givenName "Kenneth" ;
    schema:name "Kenneth Tam" ;
    .

<http://worldcat.org/isbn/9781597499774>
    a schema:ProductModel ;
    schema:isbn "1597499773" ;
    schema:isbn "9781597499774" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.