|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn819506986 |
003 |
OCoLC |
005 |
20231117044759.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
121128s2013 xx a ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d E7B
|d B24X7
|d COO
|d UMI
|d N$T
|d DEBSZ
|d UIU
|d OCLCO
|d OCLCF
|d KNOVL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d OCLCQ
|d U3W
|d D6H
|d CEF
|d WYU
|d UAB
|d LEAUB
|d RDF
|d OCLCQ
|d OCLCO
|d TUHNV
|d S2H
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 842426555
|a 1243591618
|
020 |
|
|
|a 9781597499774
|q (electronic bk.)
|
020 |
|
|
|a 1597499773
|q (electronic bk.)
|
020 |
|
|
|z 9781597497473
|
020 |
|
|
|z 1597497479
|
035 |
|
|
|a (OCoLC)819506986
|z (OCoLC)842426555
|z (OCoLC)1243591618
|
050 |
|
4 |
|a TK5105.59
|b .U86 2013
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a UTM security with Fortinet :
|b Mastering FortiOS /
|c Kenneth Tam [and others].
|
260 |
|
|
|a [Place of publication not identified] :
|b Syngress,
|c 2013.
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area.
|
588 |
0 |
|
|a Publisher supplied information; title not viewed.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Title page; Copyrigh; Dedications; Contents; Acknowledgements; About The Author; Foreword; Preface; Section I:General Introduction; 1 Introduction to UTM (Unified Threat Management); Introduction; Internet and Security; Basic Network Security Concepts; Computer and Network Security Concepts and Principles; Computer and Network Security Technology Concepts; Network Security Technology Concepts; Commonly used Computer and Network Security Terms; Unified Threat Management (UTM) Foundations; The World before UTM; The History of the Unified Threat Management (UTM) Concept
|
505 |
8 |
|
|a UTM vs Other Security ArchitecturesUTM vs Best-of-Breed; UTM vs Next-Generation Firewalls; UTM vs XTM; Solving Problems with UTM; Better Security; Consistent Security Policy; Protecting against Blended Threats; Implementing Clean Pipes; More Efficient Security; Higher Performance; Enhancing Operational Response Times (Meeting and Enhancing SLAs); Getting a better Support Experience; Increasing Network Availability; Cost Effectiveness; Easier Investment Justification; Licensing Simplicity; Lowering Operational Costs; Current UTM Market Landscape; UTM a-l�a Fortinet; Reliable Performance
|
505 |
8 |
|
|a Selective FunctionalityHomegrown Technology; In-house Security Intelligence Unit: FortiGuard Labs; Single Licensing Cost; Included Virtualization; Other Vendors; Evolution and Future of UTM; 2 FortiGate Hardware Overview; FortiGate Hardware Overview; The Fortinet Way; Evolution of FortiGate; Current FortiGate Solutions; Virtualized Appliances; FortiGate Custom Hardware Accelerations Overview; Features of the Last Four Generations of Content Processor (CP) ASIC Functionalities; Features of the Network Processor (NP) ASIC Functionalities; FortiGate Hardware Accelerations Behaviors
|
505 |
8 |
|
|a Firewall Acceleration using NP ASICVPN Acceleration using NP and CP ASIC; UTM Acceleration using CP and SP ASIC; The 'Black Art' of FortiGate Sizing; Sizing Data Gathering; Assessing the Recommended FortiGate Solution; Feature Capabilities; Feature Capacity; Performance Capabilities; Centralized Management Platform Overview; Fortinet Product Portfolio; FortiGuard; FortiCarrier; FortiBridge; FortiAP; FortiToken; FortiAuthenticator; FortiMail; FortiWeb; FortiScan; FortiDB; FortiBalancer; FortiClient; References; 3 FortiOS Introduction; Fortios Architecture; Multiple Image Support
|
505 |
8 |
|
|a Firmware Image VersionsFortiOS Operational Modes; Packet Flow Handling; WebUI Management Interface; CLI Management Interface; System Options; Recommended Configuration Options; Configuring Logging; SNMP Configuration; Controlling Administrative Access; FortiOS Default Behavior to Non-Service Ports; Network Time Protocol (NTP)4; Specifying the Source IP Address for FortiOS Originated Traffic; Dealing with Administrative Operations; Performing Backups; Restoring the Configuration; Upgrading/Restoring Firmware; Password Recovery; Automatic FortiAP Firmware Updates from FortiGate; Enabling VDOMS
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Access control.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Access control
|2 fast
|0 (OCoLC)fst00872298
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Tam, Kenneth.
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597497473
|z Texto completo
|