skip to content
UTM security with Fortinet : Mastering FortiOS Preview this item
ClosePreview this item
Checking...

UTM security with Fortinet : Mastering FortiOS

Author: Kenneth Tam; et al
Publisher: [S.l.] : Syngress, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kenneth Tam; et al
ISBN: 9781597497473 1597497479 9781597499774 1597499773
OCLC Number: 819506986
Description: 1 online resource : ill.
Responsibility: Kenneth Tam...[et al.].

Abstract:

Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/819506986>
library:oclcnum"819506986"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/819506986>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"Computer networks / Security measures."
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Networking / Security"
schema:about
rdf:typeschema:Intangible
schema:name"Computer networks / Access control."
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Security / General"
schema:about
schema:about
schema:about
schema:about
rdf:typeschema:Intangible
schema:name"COMPUTERS / Internet / Security"
schema:bookFormatschema:EBook
schema:contributor
schema:datePublished"2013"
schema:description"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1185202714>
schema:inLanguage"en"
schema:name"UTM security with Fortinet Mastering FortiOS"
schema:publisher
schema:url<http://site.ebrary.com/id/10626278>
schema:url<http://www.books24x7.com/marc.asp?bookid=51019>
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=486625>
schema:url<http://www.sciencedirect.com/science/book/9781597497473>
schema:url<http://proquest.safaribooksonline.com/?fpi=9781597497473>
schema:workExample
schema:workExample
schema:workExample
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.