![]() |
![]() |
Your cart is empty |
||
Showing 1 - 1 of 1 matches in All Departments
Traditionally, network security (firewalls to block unauthorized
users, Intrusion Prevention Systems (IPS)to keep attackers out, Web
filters to avoid misuse of Internet browsing, and antivirus
software to block malicious programs) required separate boxes with
increasedcost and complexity. Unified Threat Management (UTM)makes
network security less complex, cheaper, and more effective by
consolidating all these components. This book explains the
advantages of using UTM and how it works, presents best practices
on deployment, and is a hands-on, step-by-step guide to deploying
Fortinet's FortiGate in the enterprise.
|
![]() ![]() You may like...
Psychiatric Controversies in Epilepsy
Andres Kanner, Steven C Schachter
Hardcover
International Review of Research in…
Robert M. Hodapp, Deborah J. Fidler
Hardcover
R4,785
Discovery Miles 47 850
Computational Electromagnetics
Konada Umashankar, Allen Taflove
Hardcover
R5,315
Discovery Miles 53 150
Bayesian Networks and Influence…
Uffe B. Kjaerulff, Anders L. Madsen
Hardcover
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter
Paperback
|