Implementing NAP and NAC Security Technologies
The Complete Guide to Network Access Control
By Daniel V. Hoffman
Publisher: Wiley
Final Release Date: June 2008
Pages: 266

Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

  • Follow the actual steps hackers take to perform specific exploits
  • Determine which security solutions will stop the exploits from happening

  • Gain a strong understanding of the various NAP/NAC terms, standards, and organizations

  • Learn all about the standard components of any NAP/NAC solution

  • Analyze a security posture, set policies for device analysis, communicate to the device, and take action

  • Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

Product Details
Recommended for You
Customer Reviews
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook:  $57.95
Formats:  PDF