Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Kenneth Tam, Fortinet Certified Network Security Professional (FCNSP), is a senior security engineer at Fortinet, providing hands-on installation, support, and training to customers in the North Central United States. He has over 15 years' experience in the networking/security field from working with companies such as Juniper Networks, Netscreen Technologies, 3com, and US Robotics.
Ken McAlpine, Cisco Certified Internetworking Expert (CCIE), Fortinet Certified Network Security Professional (FCNSP), is a senior consulting systems engineer at Fortinet. His areas of interest and expertise include the overall design, security, implementation, and documentation of a secure smart grid network. As an expert in the field, he regularly presents at conferences, including the Smart Grid Interoperability Conference.
Martín H. Hoz Salvador, Fortinet Certified Network Security Professional (FCNSP), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA), is a systems engineering manager for Latin America and the Caribbean at Fortinet. In this capacity he oversees business development from the engineering standpoint, which includes hands-on demonstrations, partners training, and developing technical documentation. He has over 15 years' experience in the networking/security field, and is a regular presenter at security conferences in Latin America and Europe.
Josh has over fifteen years of experience in IT, and ten years working in Security. Though today, he primarily works as a security consultant, he has also worked in roles ranging from user to developer to system administrator. He holds several security and technical certifications and serves in a leadership position on several security-focused groups. He writes a blog on security at www.starmind.org and www.rjssoftware.com. As security works best from a holistic approach, he works all angles: risk assessments, posture analysis, incident response, malware analysis, infrastructure defense, system forensics, employee training and business strategy. Josh More works at RJS Software Systems, a national data management and security company.
Bruce Matsugu is currently a consulting systems engineer at Fortinet and has been with Fortinet for over 10-years in a variety of roles including technical support, release management, training, and professional services. A graduate of the University of British Columbia in electrical engineering, Bruce worked previously in hardware design for fibre transport telecom systems and multi-service routers, and in project engineering for wireless messaging systems. He currently lives near Vancouver, BC.
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
|Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 12,20 per la spedizione da U.S.A. a Italia
Destinazione, tempi e costiEUR 11,54 per la spedizione da Regno Unito a Italia
Destinazione, tempi e costiDa: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.9. Codice articolo G1597497479I4N00
Quantità: 1 disponibili
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.9. Codice articolo G1597497479I4N00
Quantità: 1 disponibili
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
Paperback. Condizione: Good. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine. Codice articolo GOR014316032
Quantità: 1 disponibili
Da: SecondSale, Montgomery, IL, U.S.A.
Condizione: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Codice articolo 00083557036
Quantità: 1 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 452 pages. 9.25x7.50x0.75 inches. In Stock. This item is printed on demand. Codice articolo __1597497479
Quantità: 2 disponibili
Da: Toscana Books, AUSTIN, TX, U.S.A.
Codice articolo Scanned1597497479
Quantità: 1 disponibili
Da: THE SAINT BOOKSTORE, Southport, Regno Unito
Paperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 887. Codice articolo B9781597497473
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 482. Codice articolo 2651435564
Quantità: 3 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 482 3:B&W 7.5 x 9.25 in or 235 x 191 mm Perfect Bound on White w/Gloss Lam. Codice articolo 57108467
Quantità: 3 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet s FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines t. Codice articolo 596371813
Quantità: Più di 20 disponibili