De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).
Köp båda 2 för 611 krKenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks, Netscreen Technologies, 3com, and US Robotics. Martn H. Hoz Salvador, Fortinet Certified Network Security Professional (FCNSP), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA), is a systems engineering manager for Latin America and the Caribbean at Fortinet. In this capacity he oversees business development from the engineering standpoint, which includes hands-on demonstrations, partners training, and developing technical documentation. He has over 15 years' experience in the networking/security field, and is a regular presenter at security conferences in Latin America and Europe. Ken McAlpine, Cisco Certified Internetworking Expert (CCIE), Fortinet Certified Network Security Professional (FCNSP), is a senior consulting systems engineer at Fortinet. His areas of interest and expertise include the overall design, security, implementation, and documentation of a secure smart grid network. As an expert in the field, he regularly presents at conferences, including the Smart Grid Interoperability Conference.
Foreword Introduction Part I: General Introduction Chapter 1: Introduction to Unified Threat Management (UTM) Chapter 2: FortiGate Hardware Platform Overview Chapter 3: FortiOS Introduction Part II: UTM Technologies Explained Chapter 4: Connectivity and Networking Technologies Chapter 5: Base Network Security Chapter 6: Application Security Chapter 7: Extended UTM Functionality Chapter 8: Analyzing Your Security Information with FortiAnalyzer Chapter 9: Managing Your Security Configurations with FortiManager Part III: Implementing a Security (UTM) Project Chapter 10: Designing a Security Solution Chapter 11: Security on Distributed Enterprises/Retail (UTM Goes Shopping) Chapter 12: Security on Financial Institutions (UTM Goes to the Bank) Appendix A: Troubleshooting the Project Appendix B: Troubleshooting Technically