UTM security with Fortinet : Mastering FortiOS / Kenneth Tam, Martiń H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, Josh More.
نوع المادة : نصالناشر:Amsterdam ; Elsevier : 2013الناشر:Tokyo : Syngress, 2013وصف:xxiv, 457 pages : illustrations ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9781597497473
- 1597497479
- TK5105.59 .U86 2013
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .U86 2013 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011141302 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .U86 2013 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011141303 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5105.59 .U68 2017 US national cybersecurity : international politics, concepts and organization / | TK5105.59 .U68 2017 US national cybersecurity : international politics, concepts and organization / | TK5105.59 .U86 2013 UTM security with Fortinet : Mastering FortiOS / | TK5105.59 .U86 2013 UTM security with Fortinet : Mastering FortiOS / | TK5105.59 .V3 1997 Intranet security | TK5105.59 .V358 2019 Cybersecurity : politics, governance and conflict in cyberspace / | TK5105.59 .V358 2019 Cybersecurity : politics, governance and conflict in cyberspace / |
"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover.