Image from Google Jackets

UTM security with Fortinet : Mastering FortiOS Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, Josh More.

Contributor(s): Material type: TextTextPublication details: London: Elsevier, 2013.Description: xxiv, 457 pages : illustrations ; 24 cmISBN:
  • 9781597497473 (Pbk):
Subject(s): DDC classification:
  • 23 005.8 T15U
LOC classification:
  • TK5105.59 .U86 2013
Summary: "Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Notes Date due Barcode
Books Books Central Library, IISER Bhopal Reference Section Reference 005.8 T15U (Browse shelf(Opens below)) Not For Loan Reserve 8423

"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover.

There are no comments on this title.

to post a comment.



Contact for Queries: skpathak@iiserb.ac.in