Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    (DE-627)1658282752
    Format: 1 online resource (266 pages)
    Edition: 1st ed.
    ISBN: 9780470371541
    Content: Prevent hacker exploits with this comprehensive implementation guide You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits Determine which security solutions will stop the exploits from happening Gain a strong understanding of the various NAP/NAC terms, standards, and organizations Learn all about the standard components of any NAP/NAC solution Analyze a security posture, set policies for device analysis, communicate to the device, and take action Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC.
    Content: Intro -- Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control -- About the Author -- Credits -- Contents -- Acknowledgments -- Introduction -- An Ethical Hacker's Perspective -- Misconceptions Abound -- The Flow of This Book -- What You'll Learn -- Questions to Ask Yourself as You Read This Book -- Chapter 1: Understanding Terms and Technologies -- Who Is the Trusted Computing Group? -- Is There a Cisco NAC Alliance Program? -- Understanding Clientless and Client-Based NAC -- Pre-Admission NAC -- Post-Admission NAC -- Summary -- Chapter 2: The Technical Components of NAC Solutions -- Analyzing the Security Posture -- Setting Policy for Device Analysis -- Communicating the Security Posture of the Device -- Taking Action Based on the Security Posture -- Remediating the Security Deficiency -- The Reporting Mechanism -- Summary -- Chapter 3: What Are You Trying to Protect? -- LAN-Based NAC -- Mobile NAC -- Summary -- Chapter 4: Understanding the Need for LAN-Based NAC/NAP -- The Security Reasons for LAN-Based NAC -- Unintentional LAN-Based Threats -- Real-World Example of an Unintentional Threat -- Intentional LAN-Based Threats -- Summary -- Chapter 5: Understanding the Need for Mobile NAC -- What's the Primary Need? -- Why Companies Look to Mobile NAC -- Mobile NAC and Direct Attacks -- Mobile NAC and the Wireless Threat -- Mobile NAC and the Malware Threat -- Summary -- Chapter 6: Understanding Cisco Clean Access -- Deployment Scenarios and Topologies -- The Technical Components of Cisco Clean Access -- The Purpose of Cisco Clean Access -- Summary -- Chapter 7: Understanding Cisco Network Admission Control Framework -- Deployment Scenarios and Topologies -- The Technical Components of the Cisco NAC Framework -- The Purpose of Cisco NAC -- Summary -- Chapter 8: Understanding Fiberlink Mobile NAC.
    Note: Description based on publisher supplied metadata and other sources
    Additional Edition: 9780470238387
    Additional Edition: Erscheint auch als Druck-Ausgabe Hoffman, Daniel V., 1972 - Implementing NAP and NAC security technologies Indianapolis, Ind. : Wiley, 2008 9780470238387
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    Keywords: Rechnernetz ; Zugriffskontrolle ; Computersicherheit
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages