Sumbangan 15 hb September 2024 – 1 hb Oktober 2024 Mengenai pengumpulan sumbangan

UTM security with Fortinet : Mastering FortiOS

UTM security with Fortinet : Mastering FortiOS

Kenneth Tam, et al
Sukakah anda buku ini?
Bagaimana kualiti fail ini?
Muat turun buku untuk menilai kualitinya
Bagaimana kualiti fail yang dimuat turun?
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area.
Abstract: Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.
Tahun:
2013
Penerbit:
Syngress
Bahasa:
english
Halaman:
485
ISBN 10:
1597499773
ISBN 13:
9781597499774
Fail:
PDF, 15.57 MB
IPFS:
CID , CID Blake2b
english, 2013
Baca dalam Talian
Penukaran menjadi sedang dijalankan
Penukaran menjadi gagal

Istilah utama