|
![]() |
|||
|
||||
OverviewNetwork access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC. Learn the steps of assessing, evaluating, remediating, enforcing, and monitoring your program Understand the essential functions of Authentication, Authorization, and Accounting Decide on the best NAC approach for your organization and which NAC policies are appropriate Discover how to set policies that are enforceable and reasonable enough to be followed, yet still effective Become familiar with the architectures and standards essential to NAC Involve and motivate everyone in the organization whose support is critical to a successful implementation Network Access Control For Dummies shows you the steps for planning your implementation, who should be involved, where enforcement should occur, and much more. When you flip the switch, you'll know what to expect. Full Product DetailsAuthor: Jay Kelley , Rich Campagna , Denzil WesselsPublisher: John Wiley and Sons Ltd Imprint: John Wiley & Sons Ltd Dimensions: Width: 18.70cm , Height: 1.90cm , Length: 23.50cm Weight: 0.514kg ISBN: 9780470398678ISBN 10: 0470398671 Pages: 336 Publication Date: 08 May 2009 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Out of Print Availability: Out of stock ![]() Table of ContentsIntroduction. Part I: Unlocking the Mysteries of NAC. Chapter 1: Developing a Knack for NAC. Chapter 2: Knowing Why You Want NAC. Chapter 3: The NAC Lifecycle. Chapter 4: NAC Components. Chapter 5: SSL VPNs. Part II: NAC in Your Network. Chapter 6: Writing a Corporate Security Policy. Chapter 7: Herding the Cattle. Chapter 8: Identifying Who's On My Network. Chapter 9: Verifying that a PC Is Safe. Chapter 10: Deciding Where to Enforce. Chapter 11: Flipping the Switch. Part III: NAC in the Real World. Chapter 12: AC Architectures. Chapter 13: The Role of Standards. Chapter 14: Extending NAC. Part IV: The Part of Tens. Chapter 15: Ten Best Practices. Chapter 16: Ten Steps to Planning Your NAC Implementation. Chapter 17: Ten Online Information Sources. Chapter 18: Ten Definitions. Index.ReviewsAuthor InformationJay Kelley is Product Marketing Manager for Juniper Networks Unified Access Control solutions. Rich Campagna is Product Line Manager for Juniper Networks UAC and SSL VPN product families. Denzil Wessels is Technical Marketing Manager for Juniper Networks UAC and SSL VPN. Tab Content 6Author Website:Countries AvailableAll regions |