Implementing NAP and NAC security technologies: the complete guide to network access control
Hoffman, Daniel V.
Prevent hacker exploits with this comprehensive implementation guide. You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'llfind real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what typeof solution makes the most sense, based upon the most prevalent risks in yourenvironment.This work helps you: follow the actual steps hackers take to perform specific exploits; determine which security solutions will stop the exploits from happening; gain a strong understanding of the various NAP/NAC terms, standards, and organizations; learn all about the standard components of any NAP/NAC solution; analyze a security posture, set policies for device analysis, communicate to the device, and take action; and, explore NAP and NAC solutionsfrom different vendors, including Cisco[registered] NAC, Microsoft[registered] NAP, Mobile NAC, and Fiberlink Mobile NAC. INDICE: 1. Understanding Terms and Technologies. 2. The Need for NAC/NAP. 3. What Are You Trying to Protect? 4. Understanding the Need for LAN-Based NAC/NAP. 5. Understanding the Need for Mobile NAC. 6. Understanding Cisco Clean Access. 7. Understanding Cisco Network Admission Control Framework. 8. Understanding Fiberlink Mobile NAC. 9. Understanding Microsoft NAP Solutions. 10. Understanding NAC and NAP in Other Products. Appendix A. Case Studies and Additional Information. Index.
- ISBN: 978-0-470-23838-7
- Editorial: John Wiley & Sons
- Encuadernacion: Cartoné
- Páginas: 266
- Fecha Publicación: 01/04/2008
- Nº Volúmenes: 1
- Idioma: Inglés