读书人

Implementing NAP and NAC Security T

发布时间: 2010-12-28 03:14:29 作者: kind887

 Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control


基本信息出版社:John Wiley & Sons
页码:288 页
出版日期:2008年04月
ISBN:0470238380
条形码:9780470238387
装帧:精装
正文语种:英语
外文书名:微软网络接入防护与网络访问控制实现技术: 网络访问控制大全指南

内容简介 在线阅读本书

This guide presents real–world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you’ll be able to take action.
作者简介 Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author of Blackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.
专业书评 Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

Follow the actual steps hackers take to perform specific exploits

Determine which security solutions will stop the exploits from happening

Gain a strong understanding of the various NAP/NAC terms, standards, and organizations

Learn all about the standard components of any NAP/NAC solution

Analyze a security posture, set policies for device analysis, communicate to the device, and take action

Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

读书人网 >数据库

热点推荐