Implementing NAP and NAC security technologies : the complete guide to network access control /
"You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along w...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley Pub.,
©2008.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn236179142 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080728s2008 inua ob 001 0 eng d | ||
010 | |z 2008004977 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d B24X7 |d OCLCQ |d OCLCF |d NLGGC |d OCLCO |d E7B |d TEFOD |d UMI |d COO |d IDEBK |d CEF |d NHM |d DEBSZ |d EBLCP |d OCLCQ |d YDXCP |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d OCLCO |d JBG |d LOA |d AGLDB |d CNNOR |d MOR |d PIFAG |d ZCU |d LIV |d MERUC |d OCLCQ |d U3W |d BRL |d STF |d WRM |d VTS |d NRAMU |d ICG |d INT |d VT2 |d AU@ |d OCLCQ |d WYU |d G3B |d UKDOC |d NLE |d OCLCQ |d UAB |d DKC |d OCLCQ |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d UKAHL |d OCLCQ |d INARC |d OCLCO |d OCLCL | ||
015 | |a GBA847895 |2 bnb | ||
016 | 7 | |a 014566755 |2 Uk | |
019 | |a 297464971 |a 402442097 |a 437219590 |a 647764663 |a 698473243 |a 746574115 |a 815571752 |a 859882707 |a 922973814 |a 927461689 |a 961567171 |a 962628424 |a 966221493 |a 988527804 |a 992080184 |a 1037527635 |a 1037786693 |a 1038653586 |a 1044317756 |a 1045520738 |a 1055383070 |a 1056379632 |a 1058127698 |a 1060791290 |a 1065089438 |a 1074329771 |a 1081265533 |a 1097160858 |a 1192347713 |a 1228607039 |a 1240523101 |a 1358640463 | ||
020 | |a 9780470371541 |q (electronic bk.) | ||
020 | |a 0470371544 |q (electronic bk.) | ||
020 | |a 1281381942 | ||
020 | |a 9781281381941 | ||
020 | |z 0470238380 |q (cloth ; |q alk. paper) | ||
020 | |z 9780470238387 |q (cloth ; |q alk. paper) | ||
029 | 1 | |a AU@ |b 000048827493 | |
029 | 1 | |a AU@ |b 000051372388 | |
029 | 1 | |a AU@ |b 000067105146 | |
029 | 1 | |a CHBIS |b 006150360 | |
029 | 1 | |a DEBBG |b BV043160217 | |
029 | 1 | |a DEBBG |b BV044130287 | |
029 | 1 | |a DEBSZ |b 355412802 | |
029 | 1 | |a DEBSZ |b 396180876 | |
029 | 1 | |a DEBSZ |b 422115010 | |
029 | 1 | |a GBVCP |b 802619029 | |
029 | 1 | |a HEBIS |b 291485030 | |
029 | 1 | |a NZ1 |b 13340336 | |
029 | 1 | |a AU@ |b 000054165442 | |
035 | |a (OCoLC)236179142 |z (OCoLC)297464971 |z (OCoLC)402442097 |z (OCoLC)437219590 |z (OCoLC)647764663 |z (OCoLC)698473243 |z (OCoLC)746574115 |z (OCoLC)815571752 |z (OCoLC)859882707 |z (OCoLC)922973814 |z (OCoLC)927461689 |z (OCoLC)961567171 |z (OCoLC)962628424 |z (OCoLC)966221493 |z (OCoLC)988527804 |z (OCoLC)992080184 |z (OCoLC)1037527635 |z (OCoLC)1037786693 |z (OCoLC)1038653586 |z (OCoLC)1044317756 |z (OCoLC)1045520738 |z (OCoLC)1055383070 |z (OCoLC)1056379632 |z (OCoLC)1058127698 |z (OCoLC)1060791290 |z (OCoLC)1065089438 |z (OCoLC)1074329771 |z (OCoLC)1081265533 |z (OCoLC)1097160858 |z (OCoLC)1192347713 |z (OCoLC)1228607039 |z (OCoLC)1240523101 |z (OCoLC)1358640463 | ||
037 | |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.597 |b .H64 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UT |2 bicssc | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Hoffman, Daniel |q (Daniel V.), |d 1972- |1 https://id.oclc.org/worldcat/entity/E39PCjHwrTM66TV3YKbpXwMvBP | |
245 | 1 | 0 | |a Implementing NAP and NAC security technologies : |b the complete guide to network access control / |c Daniel V. Hoffman. |
260 | |a Indianapolis, IN : |b Wiley Pub., |c ©2008. | ||
300 | |a 1 online resource (xxi, 266 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Ch. 1. Understanding Terms and Technologies -- Ch. 2. The Technical Components of NAC Solutions -- Ch. 3. What Are You Trying to Protect? -- Ch. 4. Understanding the Need for LAN-Based NAC/NAP -- Ch. 5. Understanding the Need for Mobile NAC -- Ch. 6. Understanding Cisco Clean Access -- Ch. 7. Understanding Cisco Network Admission Control Framework -- Ch. 8. Understanding Fiberlink Mobile NAC -- Ch. 9. Understanding Microsoft NAP Solutions -- Ch. 10. Understanding NAC and NAP in Other Products -- App. A. Case Studies and Additional Information. | |
520 | 1 | |a "You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment."--Jacket | |
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer networks |x Access control. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer network protocols. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Protocoles de réseaux d'ordinateurs. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer network protocols |2 fast | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
758 | |i has work: |a Implementing NAP and NAC security technologies (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGTkx77vKv4KcPFkfFFPKm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Hoffman, Daniel (Daniel V.), 1972- |t Implementing NAP and NAC security technologies. |d Indianapolis, IN : Wiley Pub., ©2008 |z 9780470238387 |z 0470238380 |w (DLC) 2008004977 |w (OCoLC)193900876 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780470238387/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=353459 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH3916964 | ||
938 | |a 123Library |b 123L |n 11841 | ||
938 | |a Books 24x7 |b B247 |n bks00025206 | ||
938 | |a ebrary |b EBRY |n ebr10296722 | ||
938 | |a EBSCOhost |b EBSC |n 231161 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 138194 | ||
938 | |a YBP Library Services |b YANK |n 2854986 | ||
938 | |a Internet Archive |b INAR |n implementingnapn0000hoff | ||
994 | |a 92 |b IZTAP |