Implementing NAP and NAC Security Technologies
The Complete Guide to Network Access Control
By Daniel V. Hoffman
Publisher: Wiley
Final Release Date: June 2008
Pages: 266

Prevent hacker exploits with this comprehensive implementationguide

You're ready to see through the misconceptions andmisinformation about NAP/NAC that might come your way. Here is anexcellent resource for uncovering the actual vulnerabilities andexploits that the various NAP/NAC types can address. You'll findreal-world hacking scenarios, along with complete implementationguidance for the right NAP/NAC solution. This guide will help youdetermine what type of solution makes the most sense, based uponthe most prevalent risks in your environment.

  • Follow the actual steps hackers take to perform specificexploits
  • Determine which security solutions will stop the exploits fromhappening

  • Gain a strong understanding of the various NAP/NAC terms,standards, and organizations

  • Learn all about the standard components of any NAP/NACsolution

  • Analyze a security posture, set policies for device analysis,communicate to the device, and take action

  • Explore NAP and NAC solutions from different vendors, includingCisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

Product Details
Recommended for You
Customer Reviews
Buy 2 Get 1 Free Free Shipping Guarantee
Buying Options
Immediate Access - Go Digital what's this?
Ebook: $57.95
Formats:  PDF