
Download App
>> | LShop | >> | Book | >> | Computing & Informat... | >> | Computer Science | >> | Hacking Exposed Wire... |
ISBN
:
9780071070911
Publisher
:
Tata Mcgraw Hill Education Private Limited
Subject
:
Computer Science
Binding
:
softcover
Pages
:
524
Year
:
2010
₹
595.0
₹
446.0
Buy Now
Shipping charges are applicable for books below Rs. 101.0
View DetailsEstimated Shipping Time : 5-7 Business Days
View DetailsDescription
Filled with tactical security information, Hacking Exposed Wireless, Second Edition sheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. The book includes vital details on new, previously unpublished attacks alongside real-world, proven countermeasures. Seven new chapters discuss in depth how to conduct an assessment from start to finish, secure Bluetooth networks, write custom wireless security tools, and ensure compliance with the latest wireless laws and regulations. Hacking Exposed Wireless, Second Edition features: Thorough updates for the latest wireless threats and techniques Information on wireless laws and regulations including how to meet PCI wireless security requirements Content written by world-renowned wireless security experts Global examples throughout
Author Biography
Vincent Liu is the Managing Director at Stach & Liu, a security consulting firm providing services to Fortune 500 companies, global financial institutions, and U.S. and foreign governments. Table of Contents Part I: Hack 802.11 Wireless Technology 1 Introduction to 802.11 Hacking 2 Scanning and Enumerating 802.11 Networks 3 Attacking 802.11 Wireless Networks 4 Attacking WPA-protected 802.11 Networks Part II: Hack 802.11 Clients 5 Attack 802.11 WirelessClients 6 Taking it All the Way: Bridging the Airgap from OS X 7 Taking it All the Way: Bridge the Airgap from Windows Part III: Hack Additional Wireless Technologies 8 Bluetooth Scanning and Reconnaissance 9 Bluetooth Eavesdropping 10 Attacking and Exploiting Bluetooth 11 Hack Zigbee 12 Hack DECT Appendix A: Scoping and Information Gathering
Related Items
-
of
Internet Security: Hacking, Counterhacking, and Security
Kenneth Einar Himma
Starts At
2625.0
3241.0
19% OFF
Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Marcus Taylor
Starts At
1681.0
2128.0
21% OFF
Security In Wireless LANS And MANS (Artech House Computer Security)
Thomas Hardjono
Starts At
7961.0
9257.0
14% OFF
Ambient Intelligence, Wireless Networking, And Ubiquitous Computing (Mobile Communications)
Athanasios Vasilakos
Starts At
12353.0
14364.0
14% OFF
Radio Resource Management for Multimedia QoS Support in Wireless Networks
Huan Chen
Starts At
13839.0
14416.0
4% OFF
Developing Services for the Wireless Internet (Computer Communications and Networks)
Maurizio Morisio
Starts At
11382.0
11857.0
4% OFF
Resource Allocation in Wireless Networks: Theory and Algorithms (Lecture Notes in Computer Science / Theoretical Computer Science and General Issues)
Slawomir Stanczak
Starts At
2658.0
3091.0
14% OFF
Radio Propagation and Adaptive Antennas for Wireless Communication Links: Terrestrial, Atmospheric and Ionospheric (Wiley Series in Microwave and Optical Engineering)
Nathan Blaunstein
Starts At
12838.0
14928.0
14% OFF
CCNA Cisco Certified Network Associate Wireless Study Guide (Exam 640-721) (with CD-ROM)
Henry Chou
Starts At
493.0
595.0
17% OFF
Hacking Exposed: Network Security Secrets and Solutions
Stuart Mcclure
Starts At
401.0
550.0
27% OFF
Are you sure you want to remove the item from your Bag?
Yes
No
Added to Your Wish List
OK
Your Shopping Bag
- 3 Items
Item
Delivery
Unit Price
Quantity
Sub Total
Order Summary