feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Material
Consortium
Language
  • 1
    UID:
    (DE-627)1658282752
    Format: 1 online resource (266 pages)
    Edition: 1st ed.
    ISBN: 9780470371541
    Content: Prevent hacker exploits with this comprehensive implementation guide You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits Determine which security solutions will stop the exploits from happening Gain a strong understanding of the various NAP/NAC terms, standards, and organizations Learn all about the standard components of any NAP/NAC solution Analyze a security posture, set policies for device analysis, communicate to the device, and take action Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC.
    Content: Intro -- Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control -- About the Author -- Credits -- Contents -- Acknowledgments -- Introduction -- An Ethical Hacker's Perspective -- Misconceptions Abound -- The Flow of This Book -- What You'll Learn -- Questions to Ask Yourself as You Read This Book -- Chapter 1: Understanding Terms and Technologies -- Who Is the Trusted Computing Group? -- Is There a Cisco NAC Alliance Program? -- Understanding Clientless and Client-Based NAC -- Pre-Admission NAC -- Post-Admission NAC -- Summary -- Chapter 2: The Technical Components of NAC Solutions -- Analyzing the Security Posture -- Setting Policy for Device Analysis -- Communicating the Security Posture of the Device -- Taking Action Based on the Security Posture -- Remediating the Security Deficiency -- The Reporting Mechanism -- Summary -- Chapter 3: What Are You Trying to Protect? -- LAN-Based NAC -- Mobile NAC -- Summary -- Chapter 4: Understanding the Need for LAN-Based NAC/NAP -- The Security Reasons for LAN-Based NAC -- Unintentional LAN-Based Threats -- Real-World Example of an Unintentional Threat -- Intentional LAN-Based Threats -- Summary -- Chapter 5: Understanding the Need for Mobile NAC -- What's the Primary Need? -- Why Companies Look to Mobile NAC -- Mobile NAC and Direct Attacks -- Mobile NAC and the Wireless Threat -- Mobile NAC and the Malware Threat -- Summary -- Chapter 6: Understanding Cisco Clean Access -- Deployment Scenarios and Topologies -- The Technical Components of Cisco Clean Access -- The Purpose of Cisco Clean Access -- Summary -- Chapter 7: Understanding Cisco Network Admission Control Framework -- Deployment Scenarios and Topologies -- The Technical Components of the Cisco NAC Framework -- The Purpose of Cisco NAC -- Summary -- Chapter 8: Understanding Fiberlink Mobile NAC.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9780470238387
    Additional Edition: Erscheint auch als Druck-Ausgabe Hoffman, Daniel V., 1972 - Implementing NAP and NAC security technologies Indianapolis, Ind. : Wiley, 2008 9780470238387
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Rechnernetz ; Zugriffskontrolle ; Computersicherheit
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    (DE-604)BV043140562
    Format: 1 Online-Ressource (xx, 292 p.)
    ISBN: 0470169761 , 9780470169766
    Note: Includes bibliographical references and index , Ch. 1. Understanding the threats -- Ch. 2. Understanding the devices -- Ch. 3. Exploiting BlackBerry devices -- Ch. 4. Hacking the supporting BlackBerry infrastructure -- Ch. 5. Protecting your PC and LAN from BlackBerrys -- Ch. 6. Exploiting PDAs -- Ch. 7. Hacking the supporting PDA infrastructure -- Ch. 8. Protecting your PC and LAN from PDAs -- Ch. 9. Exploiting cell phones -- Ch. 10. Protecting the enterprise PC and LAN from cell phones , Is someone waiting to pick off your BlackBerry?. Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 0-470-12754-6
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-0-470-12754-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    (DE-604)BV043160217
    Format: 1 Online-Ressource (xxi, 266 p.)
    ISBN: 0470371544 , 9780470371541
    Note: Includes bibliographical references and index , Ch. 1. Understanding Terms and Technologies -- Ch. 2. The Technical Components of NAC Solutions -- Ch. 3. What Are You Trying to Protect? -- Ch. 4. Understanding the Need for LAN-Based NAC/NAP -- Ch. 5. Understanding the Need for Mobile NAC -- Ch. 6. Understanding Cisco Clean Access -- Ch. 7. Understanding Cisco Network Admission Control Framework -- Ch. 8. Understanding Fiberlink Mobile NAC -- Ch. 9. Understanding Microsoft NAP Solutions -- Ch. 10. Understanding NAC and NAP in Other Products -- App. A. Case Studies and Additional Information , "You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment."--Jacket
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 0-470-23838-0
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-0-470-23838-7
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    (DE-603)291485030
    Format: XXI, 266 S.
    Edition: Online-Ausg. Sebastopol, CA O'Reilly Media Inc. 2012 Online-Ressource Safari Tech Books Online ISBN 0470238380
    Edition: [Online-Ausg.]
    ISBN: 9780470238387 , 0470238380 (Sekundärausgabe)
    Series Statement: Safari Books Online
    Note: Online-Ausg.:
    Language: English
    Keywords: Online-Publikation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    (DE-101)1063098939
    Format: Online-Ressource
    Edition: 1., Auflage
    ISBN: 9780470371541 , 0470371544
    Note: Lizenzpflichtig
    Additional Edition: Druckausg. 9780470238387
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    (DE-101)1063264359
    Format: Online-Ressource
    Edition: 1., Auflage
    ISBN: 9780470169766 , 0470169761
    Note: Lizenzpflichtig
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    (DE-603)459847600
    Format: XXI, 266 S. , Ill. u. graph. Darst.
    ISBN: 9780470238387
    Language: German
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    (DE-627)560715269
    Format: XXI, 266 S. , Ill., graph. Darst.
    ISBN: 9780470238387
    Content: Understanding terms and technologies -- The technical components of NAC solutions -- What are you trying to protect? -- Understanding the need for LAN-based NAC/NAP -- Understanding the need for mobile NAC -- Understanding Cisco Clean Access -- Understanding Cisco Network Admission Control framework -- Understanding Fiberlink Mobile NAC -- Understanding Microsoft NAP solutions -- Understanding NAC and NAP in other products -- Appendix A : Case studies and additional information
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Online-Ausgabe Hoffman, Daniel V., 1972 - Implementing NAP and NAC Security Technologies Hoboken : Wiley, 2008 9780470371541
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Rechnernetz ; Zugriffskontrolle ; Computersicherheit
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    (DE-627)529549344
    Format: XX, 292 S. , Ill., graph. Darst.
    ISBN: 0470127546 , 9780470127544
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Notepad-Computer ; Handy ; Computersicherheit
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    (DE-605)HT015533981
    Format: XXI, 266 S. : Ill., graph. Darst.
    ISBN: 9780470238387
    Language: English
    Keywords: Rechnernetz ; Zugriffskontrolle ; Computersicherheit
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages