Articoli correlati a Implementing NAP and NAC Security Technologies: The...

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control - Rilegato

 
9780470238387: Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Vedi tutte le copie di questo ISBN:
 
 
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you?ll be able to take action.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:
Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author ofBlackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.
Dalla quarta di copertina:
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

  • Follow the actual steps hackers take to perform specific exploits
  • Determine which security solutions will stop the exploits from happening

  • Gain a strong understanding of the various NAP/NAC terms, standards, and organizations

  • Learn all about the standard components of any NAP/NAC solution

  • Analyze a security posture, set policies for device analysis, communicate to the device, and take action

  • Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreJohn Wiley & Sons Inc
  • Data di pubblicazione2008
  • ISBN 10 0470238380
  • ISBN 13 9780470238387
  • RilegaturaCopertina rigida
  • Numero edizione1
  • Numero di pagine266

(nessuna copia disponibile)

Cerca:



Inserisci un desiderata

Se non trovi il libro che cerchi su AbeBooks possiamo cercarlo per te automaticamente ad ogni aggiornamento del nostro sito. Se il libro è ancora reperibile da qualche parte, lo troveremo!

Inserisci un desiderata

I migliori risultati di ricerca su AbeBooks