Implementing NAP and NAC security technologies The complete guide to network access control
This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exp...
Đã lưu trong:
Tác giả chính: | |
---|---|
Tác giả khác: | |
Ngôn ngữ: | Undetermined English |
Được phát hành: |
Indianapolis
Wiley Pub.
2008
|
Những chủ đề: | |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Trung tâm Học liệu Trường Đại học Trà Vinh |
---|
LEADER | 01353nam a2200277Ia 4500 | ||
---|---|---|---|
001 | TVU_9226 | ||
008 | 210423s9999 xx 000 0 und d | ||
020 | |a 0470238380 | ||
020 | |a 9780470238387 | ||
041 | |a eng | ||
082 | |a 5.8 | ||
082 | |b H699 | ||
100 | |a Hoffman, Daniel V. | ||
245 | 0 | |a Implementing NAP and NAC security technologies | |
245 | 4 | |b The complete guide to network access control | |
245 | 0 | |c Daniel V. Hoffman | |
260 | |a Indianapolis | ||
260 | |b Wiley Pub. | ||
260 | |c 2008 | ||
300 | |a xxi, 266 p. | ||
300 | |b ill. | ||
300 | |c 25 cm | ||
520 | |a This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you?ll be able to take action | ||
650 | |a Computer networks; Computer networks; Computer network protocols | ||
700 | |a Daniel V. Hoffman | ||
980 | |a Trung tâm Học liệu Trường Đại học Trà Vinh |