Buy Used
CDN$ 6.74
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Moderate wear on cover and edges. Minimal highlighting and/or other markings can be present. May be ex-library copy and may not include CD, Accessories and/or Dust Cover. Good readable copy.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Network Access Control For Dummies Paperback – May 11 2009

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 17.15 CDN$ 6.74

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 336 pages
  • Publisher: For Dummies; 1 edition (May 11 2009)
  • Language: English
  • ISBN-10: 0470398671
  • ISBN-13: 978-0470398678
  • Product Dimensions: 18.8 x 2.1 x 23.5 cm
  • Shipping Weight: 499 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #2,113,221 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

From the Back Cover

Get on the fast track to NAC and keep your network safe

These days, when employees, partners, and guests want to access your network using laptops, mobile devices, and more, protecting your network takes on a new dimension. Network access control is the answer, and here's where you'll learn to make sense of it all. Discover how NAC works, implement a program, and prepare to take real-world challenges in stride!

  • The NAC lifecycle — learn the steps of assessing, evaluating, remediating, enforcing, and monitoring your program
  • Which one's for you? — decide on the best NAC approach for your organization

  • AAA is not the auto club — understand the essential functions of Authentication, Authorization, and Accounting

  • It's our policy — determine which NAC policies are appropriate for your company

  • A delicate balance — learn how to set policies that are enforceable and reasonable enough to be followed, yet still effective

  • Get 'em on board — involve and motivate everyone whose support is critical to a successful implementation

  • Let's get techie — become familiar with the architectures and standards involved

  • Be prepared — know what to expect when you flip the switch

Open the book and find:

  • What NAC is, and what it isn't
  • Key business drivers for deploying NAC

  • Steps for planning your implementation

  • Who needs to be involved

  • Ten best practices for NAC

  • Where enforcement should occur

  • The role of standards

  • How NAC works with other network components

About the Author

Jay Kelley is Product Marketing Manager for Juniper Networks Unified Access Control solutions. Rich Campagna is Product Line Manager for Juniper Networks UAC and SSL VPN product families. Denzil Wessels is Technical Marketing Manager for Juniper Networks UAC and SSL VPN.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0xa656d198) out of 5 stars 2 reviews
2 of 2 people found the following review helpful
By Kevin Fletcher - Published on
Format: Paperback
Well rounded book with lots of goodies inside. While it is somewhat technical, it covers many different aspects of NAC.
HASH(0xa6c76db0) out of 5 stars In all fairness, not what I was looking for Jan. 7 2010
By James Ranager - Published on
Format: Paperback Verified Purchase
I bought this book to help me find a solution to a work problem I have. It did not address that problem. In all fairness, though, the book is good, especially if you are trying to implement RADIUS or TACACS+ in your network.