Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Front Cover
John Wiley & Sons, Jun 2, 2008 - Computers - 266 pages
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you?ll be able to take action.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The Complete Guide to Network Access Control Chapter 1 Understanding Terms and Technologies
1
The Complete Guide to Network Access Control Chapter 2 The Technical Components of NAC Solutions
17
The Complete Guide to Network Access Control Chapter 3 What Are You Trying to Protect?
61
The Complete Guide to Network Access Control Chapter 4 Understanding the Need for LANBased NACNAP
77
The Complete Guide to Network Access Control Chapter 5 Understanding the Need for Mobile NAC
127
The Complete Guide to Network Access Control Chapter 6 Understanding Cisco Clean Access
167
The Complete Guide to Network Access Control Chapter 7 Understanding Cisco Network Admission Control Framework
189
The Complete Guide to Network Access Control Chapter 8 Understanding Fiberlink Mobile NAC
205
The Complete Guide to Network Access Control Chapter 9 Understanding Microsoft NAP Solutions
225
The Complete Guide to Network Access Control Chapter 10 Understanding NAC and NAP in Other Products
251
The Complete Guide to Network Access Control Appendix A Case Studies and Additional Information
259
The Complete Guide to Network Access Control Index
261
Copyright

Other editions - View all

Common terms and phrases

About the author (2008)

Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author of Blackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.

Bibliographic information