Cantitate/Preț
Produs

UTM Security with Fortinet: Mastering FortiOS

Autor Kenneth Tam, Ken McAlpine, Martín H. Hoz Salvador, Josh More, Rick Basile, Bruce Matsugu
en Limba Engleză Paperback – 17 dec 2012
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.

  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet’s documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
Citește tot Restrânge

Preț: 22618 lei

Preț vechi: 25356 lei
-11% Nou

Puncte Express: 339

Preț estimativ în valută:
4329 4481$ 3659£

Carte tipărită la comandă

Livrare economică 26 februarie-12 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781597497473
ISBN-10: 1597497479
Pagini: 452
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 23 mm
Greutate: 0.73 kg
Ediția:New.
Editura: ELSEVIER SCIENCE

Public țintă

Network administrators, Information security managers, Network security architects, Computer security and data security professionals

Cuprins

Foreword
Introduction
Part I: General Introduction
1. Introduction to Unified Threat Management (UTM)
2. FortiGate Hardware Platform Overview
3. FortiOS Introduction

Part II: UTM Technologies Explained
4. Connectivity and Networking Technologies
5. Base Network Security
6. Application Security
7. Extended UTM Functionality
8. Analyzing Your Security Information with FortiAnalyzer
9. Managing Your Security Configurations with FortiManager

Part III: Implementing a Security (UTM) Project
10. Designing a Security Solution
11. Security on Distributed Enterprises/Retail (UTM Goes Shopping)
12. Security on Financial Institutions (UTM Goes to the Bank)
Appendix A: Troubleshooting the Project
Appendix B: Troubleshooting Technically