E-Books are also available on all known E-Book shops.
Short description The book teaches the reader about all aspects of NAC/NAP technology. It begins with an introduction on the evolution of NAC/NAP, followed by a detailed explanation into the various technologies and terms associated with NAC/NAP. Next, detailed examples of why the various types of NAC/NAP are necessary are provided. These examples include specific real-world hacking scenarios that the NAC/NAP solutions would prevent. The next portion of the book covers the three leading NAC/NAP offerings, which include Cisco NAC, Microsoft NAP and Mobile NAC. Additional NAC/NAP solutions are also covered, and the book concludes with case studies on companies that have implemented the solutions.
From the contents Acknowledgments.
Chapter 1 Understanding Terms and Technologies.
Chapter 2 The Technical Components of NAC Solutions.
Chapter 3 What Are You Trying to Protect?
Chapter 4 Understanding the Need for LAN-Based NAC/NAP.
Chapter 5 Understanding the Need for Mobile NAC.
Chapter 6 Understanding Cisco Clean Access.
Chapter 7 Understanding Cisco Network Admission Control Framework.