000 02201cam a22003617i 4500
003 OSt
005 20221015115345.0
020 _a9781597497473
040 _aYDXCP
_beng
_cYDXCP
_erda
_dBDX
_dOCLCQ
_dBWX
_dVGM
_dOCLCQ
_dDLC
041 _aEng
042 _alccopycat
050 0 0 _aTK5105
_bTAM
245 0 0 _aUTM security with Fortinet :
_bMastering FortiOS /
_cKenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu and Josh More.
264 1 _aAmsterdam ;
_aBoston ;
_c2013
264 4 _c©2013
300 _axxiv, 457 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index
520 _a"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer networks
_xAccess control.
700 1 _aTam, Kenneth,
_eauthor.
700 1 _aSalvador, Martín H. Hoz,
_eauthor.
700 1 _aMcAlpine, Ken,
_eauthor.
700 1 _aBasile, Rick,
_eauthor.
700 1 _aMatsugu, Bruce,
_eauthor.
700 1 _aMore, Josh,
_eauthor.
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2lcc
_cBK
999 _c3518
_d3518