• Tous les prix incluent la TVA.
Il ne reste plus que 2 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
+ EUR 2,99 (livraison en France métropolitaine)
D'occasion: Comme neuf | Détails
Vendu par SuperBookDeals..
État: D'occasion: Comme neuf
Commentaire: Remboursement garanti à 100%. Etat neuf, expédition rapide sous 4 à 14 jours ouvrés. Plus d'un millions de clients servis. Service à la clientèle en Français.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Implementing 802.1X Security Solutions for Wired and Wireless Networks (Anglais) Relié – 4 avril 2008

4 étoiles sur 5
5 étoiles
2
4 étoiles
2
3 étoiles
2
2 étoiles
0
1 étoile
0
4 étoiles sur 5 6 Commentaires sur Amazon.com |

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Relié
"Veuillez réessayer"
EUR 53,39
EUR 36,90 EUR 33,09
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations
click to open popover

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

You know it?s essential, and you′ve heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step–by–step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.

Quatrième de couverture

Now you can approach 802.1x implementation with confidence

You know it′s essential, and you′ve heard that it can be tricky implementing the 802.1x standard. Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks. Complete with step–by–step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.

  • Get an overview of port–based authentication and network architecture concepts

  • Examine EAPOL, RADIUS, and EAP–Methods protocols

  • Understand 802.1x protocol packet structure and operation

  • Explore and evaluate complete 802.1x–based security solutions for various needs

  • Learn what parts are necessary to construct a complete network access–control system

  • Configure your system and assure that all aspects of it work together

  • Follow step–by–step instructions and screen shots to successfully set up 802.1x–based security solutions and make them work

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.



Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: 4.0 étoiles sur 5 6 commentaires
3.0 étoiles sur 5 A good introduction for 802.1x protocols 16 janvier 2013
Par Sherif Bahaa Eldin - Publié sur Amazon.com
Format: Relié Achat vérifié
This is a good introductory book for 802.1x. Very useful on "how to" when it comes to configuration.
However, out of the book's 330 pages , it has 109 pages on RFCs and glossary.

The book also lacks at least one EAP method supplicant-authenticator-authentication server trace file with Wireshark, that shows the full end-to-end exchange in detail. That would have been great for introductory and advanced users as well. The book lacks this deeper look, anyway, it is introductory.

Sherif
3.0 étoiles sur 5 Good book for protocol learning 24 août 2012
Par Ulysses Almeida - Publié sur Amazon.com
Format: Relié Achat vérifié
Pros:
It is a good book for 802.1x protocol learning. It teaches a lot about the packets structures and low level information. It teaches some nice tips about WiFi as bonus. Very easy reading.
Cons:
I think it could tell more about the practice. It looks like 1/3 of the book is RFC, that we can easily find on Internet.
0 internautes sur 2 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 The item is okay 4 mars 2011
Par Sir Ken - Publié sur Amazon.com
Format: Relié Achat vérifié
They item came handy and okay. It was as I was expecting it to be, and also came earlier than the seller had estimated
2 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Best single 802.1X book available 21 décembre 2008
Par Tom Carpenter - Publié sur Amazon.com
Format: Relié
There is no question in my mind that this is the best single book on 802.1X available today. The coverage is complete for any wired or wireless network implementation. This book is not only good for CWSP preparation, but it is also great for real-world security implementations. I've read a lot of Jim's books and have come to expect a lot from him. I must say, this book is his best yet.

The book begins with a short 30 page review of network architectures. This review makes for a nice refresher before diving into the 802.1X information. However, unlike many books that attempt to meet a publisher page count by reviewing information the reader should know for 40-50 percent of the book, Implementing 802.1X Security Solutions leaves the refreshers here in the first chapter and spends the remaining 8 chapters and Appendix truly covering the named topic of the book. In all, more than 200 pages are dedicated to the topics related to 802.1X security solutions.

The Appendix coverage of EAP is welcomed and provides enough information to understand its operations and how to select the best EAP solution for your implementation.

I would give this book 10 stars on a 10 star rating system. Most of the books that I give five stars, here at Amazon, would only get 9 stars on a 10 star system. Jim Geier has really outdone himself with this one.
1 internautes sur 3 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 One of a kind 802.1x Book. 22 juillet 2009
Par Viken Derderian - Publié sur Amazon.com
Format: Relié
As an information security expert and ISO certified auditor, I have contact with many system engineers, network architects and network administrators. Every single one of them either never heard of 802.1x or thinks it is so hard to implement that it is not worth the trouble.
In the summery of the book by Jim Geier, even the author states "802.1X port-based authentication is much more difficult to understand and implement than is commonly thought." and I agree with him that "This book, however, pulls together all of the pertinent standards and specifications, providing the concepts, methods, and tips you need to avoid common pitfalls, saving you a great deal of time and frustration."

Reading this book helps the network architect design or redesign a network that is not only one of most secured networks in town but as a plus it helps a medium to large networks do a self administration.
just imagine having all your ports on all your switches connected and available and yet only allow authorized and authenticated users or devices access to services based on credentials provided, and send the rest to null or treat them as guests and give them access to your web site only; Create dynamic VLANs drop users to it based on groups. Have a IP phone network that uses the same switches and yet has no access to company resources all of these are possible and Jim Geier does a good job explaining how.

This book is very well written with proper examples and case studies, and yet it is not a perfect 5 star worthy since it's missing few important and relevant pieces, for example, I was looking for more on certificates, not just the mere mention of them but the configuration distribution and perhaps integration with smart cards, I know you can get that from another book but why? it would be nice to also show how IP phones can be configured and a dynamic VLAN created; Also how none 802.1x devices can be connected to the switch and use company resources; The author should have also explained on how Trunk-ed, span-ed, secured and Dynamic access ports can not be configured as 802.1x; And is it possible to have a heterogeneous environment where both 802.1x and non port authentication designs can be implemented as a viable solution?

I am an advocate of the IEEE 802.1x standard, it reminds me of Cheers Theme "Where Everybody Knows Your Name" or else you have no access. And hence, I recommend this book, it will help you understand the standard, get you started implementing or migrating to a more secured network.

Best Fishes and thank you for reading.
Ces commentaires ont-ils été utiles ? Dites-le-nous


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?