000 02202cam a22003617i 4500
001 17861825
003 OSt
005 20170706160004.0
008 130822t20132013xx a 000 0 eng d
010 _a 2012286214
020 _a9781597497473 (Pbk):
_cUSD 54.95
035 _a(OCoLC)ocn820434024
040 _aIISER Bhopal
_beng
_cIISER Bhopal
_erda
042 _alccopycat
050 0 0 _aTK5105.59
_b.U86 2013
082 _223
_a005.8 T15U
222 _aCC
245 0 0 _aUTM security with Fortinet :
_bMastering FortiOS
_cKenneth Tam, Martín H. Hoz Salvador, Ken McAlpine, Rick Basile, Bruce Matsugu, Josh More.
260 _aLondon:
_bElsevier,
_c2013.
300 _axxiv, 457 pages :
_billustrations ;
_c24 cm
520 _a"Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations. Presents topics that are not covered (or are not covered in detail) by Fortinet's documentation. Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area."--Page 4 of cover.
650 0 _aComputer networks
_xSecurity measures.
_920671
650 0 _aComputer networks
_xAccess control.
_920672
700 1 _aTam, Kenneth,
_920673
700 1 _aSalvador, Martín H. Hoz,
_920674
700 1 _aMcAlpine, Ken,
_920675
700 1 _aBasile, Rick,
_920676
700 1 _aMatsugu, Bruce,
_920677
700 1 _aMore, Josh,
_920678
906 _a7
_bcbc
_ccopycat
_d2
_encip
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c7885
_d7885