I work for a network test equipment developer and have to test devices with multiple security types by multiple security device vendors. Most all enterprise security uses 802.1x whether wired or wireless. To many, 802.1x can be confusing at best, and mind-blowing at its worst. Edwin Brown's book
802.1X Port-Based Authentication
β Scribed by Edwin Lyle Brown
- Publisher
- Auerbach
- Year
- 2007
- Tongue
- English
- Leaves
- 548
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
I work for a network test equipment developer and have to test devices with multiple security types by multiple security device vendors.
Most all enterprise security uses 802.1x whether wired or wireless. To many, 802.1x can be confusing at best, and mind-blowing at its worst.
Edwin Brown's book is the best I read on the subject. It's a book that explains the concepts that are the building blocks of 802.1x in a conversation tone that neither talks over the heads of interested parties or simplify the subject to the point of being meaningless babble.
Brown's style of writing comes across as sitting and listening to a very knowledge colleague help you to understand a subject. Brown's presents the information to you on an equal to equal basis so that you just "get it".
The technical information is clear and thorough and serves as an excellent reference when you need to dig into a specific issue of 802.1x
I'm pleased to have it on my bookshelf at work.
π SIMILAR VOLUMES
Port-based authentication is a βnetwork access controlβ concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to t
Port-based authentication is a βnetwork access controlβ concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. <b>802.1X Port-Based Authentication </b>examines how this concept can be applied and the effects of its applicati
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior