MARC details
000 -LEADER |
fixed length control field |
02202cam a22003617i 4500 |
001 - CONTROL NUMBER |
control field |
17861825 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20170706160004.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
130822t20132013xx a 000 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2012286214 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781597497473 (Pbk): |
Terms of availability |
USD 54.95 |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn820434024 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
IISER Bhopal |
Language of cataloging |
eng |
Transcribing agency |
IISER Bhopal |
Description conventions |
rda |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.U86 2013 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23 |
Classification number |
005.8 T15U |
222 ## - KEY TITLE |
Key title |
CC |
245 00 - TITLE STATEMENT |
Title |
UTM security with Fortinet : |
Remainder of title |
Mastering FortiOS |
Statement of responsibility, etc |
Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, Josh More. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
London: |
Name of publisher, distributor, etc |
Elsevier, |
Date of publication, distribution, etc |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxiv, 457 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
520 ## - SUMMARY, ETC. |
Summary, etc |
"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
20671 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Access control. |
9 (RLIN) |
20672 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Tam, Kenneth, |
9 (RLIN) |
20673 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Salvador, Martín H. Hoz, |
9 (RLIN) |
20674 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
McAlpine, Ken, |
9 (RLIN) |
20675 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Basile, Rick, |
9 (RLIN) |
20676 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Matsugu, Bruce, |
9 (RLIN) |
20677 |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
More, Josh, |
9 (RLIN) |
20678 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
ncip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |