Implementing NAP and NAC Security Technologies

Implementing NAP and NAC Security Technologies The Complete Guide to Network Access Control

Hardback (18 Apr 2008)

Not available for sale

Includes delivery to the United States

Out of stock

This service is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Publisher's Synopsis

Prevent hacker exploits with this comprehensive implementation guide

You′re ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You′ll find real–world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

  • Follow the actual steps hackers take to perform specific exploits
  • Determine which security solutions will stop the exploits from happening

  • Gain a strong understanding of the various NAP/NAC terms, standards, and organizations

  • Learn all about the standard components of any NAP/NAC solution

  • Analyze a security posture, set policies for device analysis, communicate to the device, and take action

  • Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

Book information

ISBN: 9780470238387
Publisher: Wiley
Imprint: John Wiley & Sons, Inc.
Pub date:
DEWEY: 005.8
DEWEY edition: 22
Language: English
Number of pages: 266
Weight: 598g
Height: 244mm
Width: 191mm
Spine width: 21mm