Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access Control.

By: Hoffman, Daniel VContributor(s): Hoffman, DanielMaterial type: TextTextPublisher: Hoboken : Wiley, 2008Copyright date: ©2008Edition: 1st edDescription: 1 online resource (266 pages)Content type: text Media type: computer Carrier type: online resourceISBN: 9780470371541Subject(s): Computer network protocols | Computer networks -- Access control | Computer networks -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Implementing NAP and NAC Security Technologies : The Complete Guide to Network Access ControlDDC classification: 005.8 LOC classification: TK5105.597 -- .H64 2008ebOnline resources: Click to View
Contents:
Intro -- Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control -- About the Author -- Credits -- Contents -- Acknowledgments -- Introduction -- An Ethical Hacker's Perspective -- Misconceptions Abound -- The Flow of This Book -- What You'll Learn -- Questions to Ask Yourself as You Read This Book -- Chapter 1: Understanding Terms and Technologies -- Who Is the Trusted Computing Group? -- Is There a Cisco NAC Alliance Program? -- Understanding Clientless and Client-Based NAC -- Pre-Admission NAC -- Post-Admission NAC -- Summary -- Chapter 2: The Technical Components of NAC Solutions -- Analyzing the Security Posture -- Setting Policy for Device Analysis -- Communicating the Security Posture of the Device -- Taking Action Based on the Security Posture -- Remediating the Security Deficiency -- The Reporting Mechanism -- Summary -- Chapter 3: What Are You Trying to Protect? -- LAN-Based NAC -- Mobile NAC -- Summary -- Chapter 4: Understanding the Need for LAN-Based NAC/NAP -- The Security Reasons for LAN-Based NAC -- Unintentional LAN-Based Threats -- Real-World Example of an Unintentional Threat -- Intentional LAN-Based Threats -- Summary -- Chapter 5: Understanding the Need for Mobile NAC -- What's the Primary Need? -- Why Companies Look to Mobile NAC -- Mobile NAC and Direct Attacks -- Mobile NAC and the Wireless Threat -- Mobile NAC and the Malware Threat -- Summary -- Chapter 6: Understanding Cisco Clean Access -- Deployment Scenarios and Topologies -- The Technical Components of Cisco Clean Access -- The Purpose of Cisco Clean Access -- Summary -- Chapter 7: Understanding Cisco Network Admission Control Framework -- Deployment Scenarios and Topologies -- The Technical Components of the Cisco NAC Framework -- The Purpose of Cisco NAC -- Summary -- Chapter 8: Understanding Fiberlink Mobile NAC.
Deployment Scenarios and Topologies -- The Technical Components of Fiberlink Mobile NAC -- The Purpose of Fiberlink Mobile NAC -- Summary -- Chapter 9: Understanding Microsoft NAP Solutions -- Deployment Scenarios and Topologies -- Microsoft 802.1x -- The Technical Components of Microsoft NAP -- The Purpose of Microsoft NAP -- Summary -- Chapter 10: Understanding NAC and NAP in Other Products -- NAC-Like Functionality in Non-NAC Technologies -- NAC and NAP Solutions from Other Vendors -- Summary -- Appendix A: Case Studies and Additional Information -- Cisco Clean Access -- McAfee NAC -- Bradford Networks -- Juniper Uniform Access Control -- Bibliography -- Index.
Summary: Prevent hacker exploits with this comprehensive implementation guide You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits Determine which security solutions will stop the exploits from happening Gain a strong understanding of the various NAP/NAC terms, standards, and organizations Learn all about the standard components of any NAP/NAC solution Analyze a security posture, set policies for device analysis, communicate to the device, and take action Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Intro -- Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control -- About the Author -- Credits -- Contents -- Acknowledgments -- Introduction -- An Ethical Hacker's Perspective -- Misconceptions Abound -- The Flow of This Book -- What You'll Learn -- Questions to Ask Yourself as You Read This Book -- Chapter 1: Understanding Terms and Technologies -- Who Is the Trusted Computing Group? -- Is There a Cisco NAC Alliance Program? -- Understanding Clientless and Client-Based NAC -- Pre-Admission NAC -- Post-Admission NAC -- Summary -- Chapter 2: The Technical Components of NAC Solutions -- Analyzing the Security Posture -- Setting Policy for Device Analysis -- Communicating the Security Posture of the Device -- Taking Action Based on the Security Posture -- Remediating the Security Deficiency -- The Reporting Mechanism -- Summary -- Chapter 3: What Are You Trying to Protect? -- LAN-Based NAC -- Mobile NAC -- Summary -- Chapter 4: Understanding the Need for LAN-Based NAC/NAP -- The Security Reasons for LAN-Based NAC -- Unintentional LAN-Based Threats -- Real-World Example of an Unintentional Threat -- Intentional LAN-Based Threats -- Summary -- Chapter 5: Understanding the Need for Mobile NAC -- What's the Primary Need? -- Why Companies Look to Mobile NAC -- Mobile NAC and Direct Attacks -- Mobile NAC and the Wireless Threat -- Mobile NAC and the Malware Threat -- Summary -- Chapter 6: Understanding Cisco Clean Access -- Deployment Scenarios and Topologies -- The Technical Components of Cisco Clean Access -- The Purpose of Cisco Clean Access -- Summary -- Chapter 7: Understanding Cisco Network Admission Control Framework -- Deployment Scenarios and Topologies -- The Technical Components of the Cisco NAC Framework -- The Purpose of Cisco NAC -- Summary -- Chapter 8: Understanding Fiberlink Mobile NAC.

Deployment Scenarios and Topologies -- The Technical Components of Fiberlink Mobile NAC -- The Purpose of Fiberlink Mobile NAC -- Summary -- Chapter 9: Understanding Microsoft NAP Solutions -- Deployment Scenarios and Topologies -- Microsoft 802.1x -- The Technical Components of Microsoft NAP -- The Purpose of Microsoft NAP -- Summary -- Chapter 10: Understanding NAC and NAP in Other Products -- NAC-Like Functionality in Non-NAC Technologies -- NAC and NAP Solutions from Other Vendors -- Summary -- Appendix A: Case Studies and Additional Information -- Cisco Clean Access -- McAfee NAC -- Bradford Networks -- Juniper Uniform Access Control -- Bibliography -- Index.

Prevent hacker exploits with this comprehensive implementation guide You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits Determine which security solutions will stop the exploits from happening Gain a strong understanding of the various NAP/NAC terms, standards, and organizations Learn all about the standard components of any NAP/NAC solution Analyze a security posture, set policies for device analysis, communicate to the device, and take action Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2018. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

Powered by Koha