E-books in Russian and English



<<< >>>

Welcome
(Columbus, Ohio, United States)

 


Enter · Register · Search

 
 
   
 
 
 
« Август 2008 »
Пн Вт Ср Чт Пт Сб Вс
 123
45678910
11121314151617
18192021222324
25262728293031
 
One Week Top10:
 2  3   4

date: 10 августа 2008 / author: izograv / views: 1528 / comments: 0

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control by Daniel V. Hoffman



Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

* Follow the actual steps hackers take to perform specific exploits
* Determine which security solutions will stop the exploits from happening
* Gain a strong understanding of the various NAP/NAC terms, standards, and organizations
* Learn all about the standard components of any NAP/NAC solution
* Analyze a security posture, set policies for device analysis, communicate to the device, and take action
* Explore NAP and NAC solutions from different vendors, including Cisco(r) NAC, Microsoft(r) NAP, Mobile NAC, and Fiberlink Mobile NAC




 

Comments: 0

 
 
Year Top:
2011
2010
2009
2008
2007
2006
 
  

 


 

Design/Web/Support/Anti-Leech by izograv @ yandex.ru
Optimized for Firefox | Anti-Leech tested on IE, Firefox, Reget