Narrow your search
Listing 1 - 4 of 4
Sort by

Book
UTM security with Fortinet : Mastering FortiOS
Author:
ISBN: 1283810794 1597499773 1597497479 9781597499774 9781597497473 9781283810791 Year: 2013 Publisher: Boston : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's For


Digital
UTM security with Fortinet : Mastering FortiOS
Author:
ISBN: 9781597499774 1597499773 Year: 2013 Publisher: [Place of publication not identified] Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. Provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementationsPresents topics that are not covered (or are not covered in detail) by Fortinet's documentation Discusses hands-on troubleshooting techniques at both the project deployment level and technical implementation area.

Keywords

Configuring NetScreen Firewalls
Authors: --- --- --- ---
ISBN: 1281056227 9781597490148 9786611056223 0080476783 1597490148 1932266399 9781597490146 9781932266399 9780080476780 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Configuring NetScreen Firewalls covers all of the aspects of Juniper's NetScreen product line, from devices to Enterprise NetScreen firewalls. Coverage includes basic policy creation and administration, advanced troubleshooting techniques, the NetScreen Security Manager and VPN configuration. In addition, this book covers both the WebUI and the command line interface of NetScreen ScreenOS 5.0. as well as the NetScreen Security Manager (NSM). As a special bonus, Juniper Networks provides detailed coverage of the new features and enhancements included with ScreenOS 5.1.0.

Google Hacking for Penetration Testers
Authors: --- --- --- ---
ISBN: 1931836361 159749013X 9781597490139 9781931836364 9780080478050 0080478050 1281055948 9781281055941 9786611055943 Year: 2005 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieve

Listing 1 - 4 of 4
Sort by