Introduction
Computers affect our lives every day. We use them daily to communicate in the form of e-mail and instant messaging, to surf the Internet to research a topic, to manage our personal business like banking, and to seek entertainment such as downloading music and online shopping. Computers are also used when we check out at the grocery store, withdraw cash from an automated teller machine, and talk on our mobile phones.
What do all of these have in common? They connect to a network that likely interconnects to the Internet. Connecting to the Internet exposes a computing device to malicious activity, even if it is connected just briefly. Most malicious activity comes in the form of software that is intended to harm, disable, or pull ...
Get Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.