UTM Security with Fortinet: Mastering FortiOS (häftad)
Fler böcker inom
Format
Häftad (Paperback)
Språk
Engelska
Antal sidor
452
Utgivningsdatum
2013-01-02
Förlag
SYNGRESS MEDIA
Medarbetare
H.Hoz Salvador, Martn / McAlpine, Ken
Illustratör/Fotograf
Illustrated
Illustrationer
Approx. 65 Illustrations
Dimensioner
231 x 188 x 23 mm
Vikt
726 g
Antal komponenter
1
Komponenter
3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam
ISBN
9781597497473

UTM Security with Fortinet: Mastering FortiOS

Häftad,  Engelska, 2013-01-02
421
  • Skickas från oss inom 10-15 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
  • Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations
  • Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation
  • Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
Visa hela texten

Passar bra ihop

  1. UTM Security with Fortinet: Mastering FortiOS
  2. +
  3. Co-Intelligence

De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).

Köp båda 2 för 611 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Övrig information

Kenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks, Netscreen Technologies, 3com, and US Robotics. Martn H. Hoz Salvador, Fortinet Certified Network Security Professional (FCNSP), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA), is a systems engineering manager for Latin America and the Caribbean at Fortinet. In this capacity he oversees business development from the engineering standpoint, which includes hands-on demonstrations, partners training, and developing technical documentation. He has over 15 years' experience in the networking/security field, and is a regular presenter at security conferences in Latin America and Europe. Ken McAlpine, Cisco Certified Internetworking Expert (CCIE), Fortinet Certified Network Security Professional (FCNSP), is a senior consulting systems engineer at Fortinet. His areas of interest and expertise include the overall design, security, implementation, and documentation of a secure smart grid network. As an expert in the field, he regularly presents at conferences, including the Smart Grid Interoperability Conference.

Innehållsförteckning

Foreword Introduction Part I: General Introduction Chapter 1: Introduction to Unified Threat Management (UTM) Chapter 2: FortiGate Hardware Platform Overview Chapter 3: FortiOS Introduction Part II: UTM Technologies Explained Chapter 4: Connectivity and Networking Technologies Chapter 5: Base Network Security Chapter 6: Application Security Chapter 7: Extended UTM Functionality Chapter 8: Analyzing Your Security Information with FortiAnalyzer Chapter 9: Managing Your Security Configurations with FortiManager  Part III: Implementing a Security (UTM) Project Chapter 10: Designing a Security Solution Chapter 11: Security on Distributed Enterprises/Retail (UTM Goes Shopping) Chapter 12: Security on Financial Institutions (UTM Goes to the Bank) Appendix A: Troubleshooting the Project Appendix B: Troubleshooting Technically