Implementing NAP and NAC security technologies : the complete guide to network access control /
"You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along w...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Indianapolis, IN :
Wiley Pub.,
©2008.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Ch. 1. Understanding Terms and Technologies
- Ch. 2. The Technical Components of NAC Solutions
- Ch. 3. What Are You Trying to Protect?
- Ch. 4. Understanding the Need for LAN-Based NAC/NAP
- Ch. 5. Understanding the Need for Mobile NAC
- Ch. 6. Understanding Cisco Clean Access
- Ch. 7. Understanding Cisco Network Admission Control Framework
- Ch. 8. Understanding Fiberlink Mobile NAC
- Ch. 9. Understanding Microsoft NAP Solutions
- Ch. 10. Understanding NAC and NAP in Other Products
- App. A. Case Studies and Additional Information.