The Resource UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)
UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)
Resource Information
The item UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Summary
- Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
- Language
- eng
- Label
- UTM security with Fortinet : Mastering FortiOS
- Title
- UTM security with Fortinet
- Title remainder
- Mastering FortiOS
- Statement of responsibility
- Kenneth Tam...[et al.]
- Language
- eng
- Summary
- Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area
- Cataloging source
- OPELS
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- no index present
- LC call number
- TK5105.59
- LC item number
- .U86 2013
- Literary form
- non fiction
- Nature of contents
- dictionaries
- http://library.link/vocab/relatedWorkOrContributorName
- Tam, Kenneth
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer networks
- Label
- UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)
- Antecedent source
- unknown
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Control code
- SCIDI819506986
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9781597497473
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- ill.
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- Label
- UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)
- Antecedent source
- unknown
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Control code
- SCIDI819506986
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- unknown
- Form of item
- online
- Isbn
- 9781597497473
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- ill.
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/UTM-security-with-Fortinet--Mastering-FortiOS/P4YoQR-_4qc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/UTM-security-with-Fortinet--Mastering-FortiOS/P4YoQR-_4qc/">UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/UTM-security-with-Fortinet--Mastering-FortiOS/P4YoQR-_4qc/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/UTM-security-with-Fortinet--Mastering-FortiOS/P4YoQR-_4qc/">UTM security with Fortinet : Mastering FortiOS, Kenneth Tam...[et al.], (electronic book)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>