Part III

Securing Smart Device Access

9780470927533-pp0301.eps

In this part . . .

Other parts of the book help you develop and implement policy, but this part moves on to the real world — which eventually means your network. How do you build the system of seeing, accepting or rejecting, or limiting access to the hordes of devices entering your main branch and remote offices each and every hour?

Chapters 7 and 8 contain all sorts of old friends to help you in your tasks: friends like IPSec and SSL VPNs, Wi-Fi, user authentication, and application access control.

And just to make sure you and your old friends are ready to party, our book’s model company, AcmeGizmo, has a case study to put you in the mood.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset