Implementing NAP and NAC security technologies the complete guide to network access control
Saved in:
Main Author: | |
---|---|
Format: | Book |
Published: |
Indianapolis, IN
Wiley Pub
2008
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-458857 | ||
020 | # | # | |a 9780470238387 (cloth : alk. paper) |
020 | # | # | |a 0470238380 (cloth : alk. paper) |
040 | # | # | |a DLC |d ITMB |
090 | 0 | 0 | |a TK5105.597 |b .H64 2008 |
100 | 1 | # | |a Hoffman, Danie |d 1972- |q Daniel V. |
245 | 1 | 0 | |a Implementing NAP and NAC security technologies |b the complete guide to network access control |c Daniel V. Hoffman |
260 | # | # | |a Indianapolis, IN |b Wiley Pub |c 2008 |
300 | # | # | |a xxi, 266 p. |b ill. |c 25 cm |
504 | # | # | |a Includes bibliographical references and index |
505 | 1 | # | |a Understanding terms and technologies -- The technical components of NAC solutions -- What are you trying to protect? -- Understanding the need for LAN-based NAC/NAP -- Understanding the need for mobile NAC -- Understanding Cisco Clean Access -- Understa |
650 | # | 0 | |a Computer networks |x Access control |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Computer network protocols |x Access control |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=458857 |
964 | # | # | |c BOK |d CS |
998 | # | # | |a 00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1|| |