Ch. 1. Understanding Terms and Technologies --; Ch. 2. The Technical Components of NAC Solutions --; Ch. 3. What Are You Trying to Protect? --; Ch. 4. Understanding the Need for LAN-Based NAC/NAP --; Ch. 5. Understanding the Need for Mobile NAC --; Ch. 6. Understanding Cisco Clean Access --; Ch. 7. Understanding Cisco Network Admission Control Framework --; Ch. 8. Understanding Fiberlink Mobile NAC --; Ch. 9. Understanding Microsoft NAP Solutions --; Ch. 10. Understanding NAC and NAP in Other Products --; App. A. Case Studies and Additional Information.
یادداشتهای مربوط به خلاصه یا چکیده
متن يادداشت
"You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment."--Jacket.
موضوع (اسم عام یاعبارت اسمی عام)
موضوع مستند نشده
Computer network protocols.
موضوع مستند نشده
Computer networks -- Access control.
موضوع مستند نشده
Computer networks -- Security measures.
نام شخص به منزله سر شناسه - (مسئولیت معنوی درجه اول )