Programming Books C Java PHP Python Learn more Browse Programming Books
Implementing NAP and NAC Security Technologies and over one million other books are available for Amazon Kindle. Learn more
Buy New
$45.94
Qty:1
  • List Price: $55.00
  • Save: $9.06 (16%)
Only 2 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control Hardcover – April 21, 2008

ISBN-13: 978-0470238387 ISBN-10: 0470238380 Edition: 1st

Buy New
Price: $45.94
16 New from $9.98 18 Used from $3.35
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover
"Please retry"
$45.94
$9.98 $3.35
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Hardcover: 288 pages
  • Publisher: Wiley; 1 edition (April 21, 2008)
  • Language: English
  • ISBN-10: 0470238380
  • ISBN-13: 978-0470238387
  • Product Dimensions: 9.4 x 7.5 x 0.8 inches
  • Shipping Weight: 1.3 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (2 customer reviews)
  • Amazon Best Sellers Rank: #1,782,554 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find real-world hacking scenarios, along with complete implementation guidance for the right NAP/NAC solution. This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment.

  • Follow the actual steps hackers take to perform specific exploits
  • Determine which security solutions will stop the exploits from happening

  • Gain a strong understanding of the various NAP/NAC terms, standards, and organizations

  • Learn all about the standard components of any NAP/NAC solution

  • Analyze a security posture, set policies for device analysis, communicate to the device, and take action

  • Explore NAP and NAC solutions from different vendors, including Cisco NAC, Microsoft NAP, Mobile NAC, and Fiberlink Mobile NAC

About the Author

Daniel V. Hoffman has designed mobile security solutions for the largest companies in the world. His hacking and security expertise has been featured in educational curriculum, conferences, and media outlets globally. He is the author of Blackjacking: Security Threats to Blackberry Devices, PDAs, and Cell Phones in the Enterprise, also from Wiley.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.5 out of 5 stars
5 star
1
4 star
1
3 star
0
2 star
0
1 star
0
See both customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

Format: Hardcover
Disclaimer:
I was asked to read a pre-release copy of the book, my quote made it onto the book, and I was given a review copy.

I found myself in a position to learn about the different types of NAC appliances as well as Mobile NAC. The problem is that I don't work for a NAC vendor or install NACs for a living. Googling left me with tons of vendor hype on NAC but not a lot of good information to help me understand the different type of NACs, how they work, and why I would would choose one type over the other. Dan Hoffman's book is the only NAC book I know of that is (mostly) vendor neutral. The only other NAC/NAP books I know of are Cisco Press book which obviously tout Cisco products as the best way to go. Dan Hoffman breaks down the functionality of NAC and they different types of NAC solutions into simple easy to understand language, just like he did for Blackjacking on mobile threats. He has a great knack for explaining technical systems and topics in an easy to understand way.

Here is a list of what he covers in the book:

CH1 Understanding Terms and Technologies
CH2 The Technical Components of NAC Solutions
CH3 What Are You Trying to Protect?
CH4 Understanding the Need for LAN-Based NAC/NAP
CH5 Understanding the Need for Mobile NAC
CH6 Understanding Cisco Clean Access
CH7 Understanding Cisco Network Admission Control Framework
CH8 Understanding Fiberlink Mobile NAC
CH9 Understanding Microsoft NAP Solutions
CH10 Understanding NAC and NAP in Other Products

My favorite chapters are CH3 "What Are You Trying to Protect?", CH4 "Understanding the Need for LAN-Based NAC/NAP", and CH5 "Understanding the Need for Mobile NAC.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
0 of 4 people found the following review helpful By Walid Bou on January 24, 2009
Format: Hardcover
The book was brand new as described. I will definitely buy from this seller again.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images


What Other Items Do Customers Buy After Viewing This Item?