Autor: Kevin Beaver, Peter T. Davis, Devin K. Akin
Wydawca: Wiley
Dostępność: 3-6 tygodni
Cena: 192,15 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780764597305 |
ISBN10: |
0764597302 |
Autor: |
Kevin Beaver, Peter T. Davis, Devin K. Akin |
Oprawa: |
Paperback |
Rok Wydania: |
2005-09-16 |
Ilość stron: |
384 |
Wymiary: |
235x192 |
Tematy: |
UT |
Become a cyber–hero know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient not only for you, but also for those nefarious types who′d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network′s armor.
Discover how toPerform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices
Spis treści:
Foreword.
Introduction.
Part I: Building the Foundation for Testing Wireless Networks.
Chapter 1: Introduction to Wireless Hacking.
Chapter 2: The Wireless Hacking Process.
Chapter 3: Implementing a Testing Methodology.
Chapter 4: Amassing Your War Chest.
Part II: Getting Rolling with Common Wi–Fi Hacks.
Chapter 5: Human (In)Security.
Chapter 6: Containing the Airwaves.
Chapter 7: Hacking Wireless Clients.
Chapter 8: Discovering Default Settings.
Chapter 9: Wardriving.
Part III: Advanced Wi–Fi Hacks.
Chapter 10: Still at War.
Chapter 11: Unauthorized Wireless Devices.
Chapter 12: Network Attacks.
Chapter 13: Denial–of–Service Attacks.
Chapter 14: Cracking Encryption.
Chapter 15: Authenticating Users.
Part IV: The Part of Tens.
Chapter 16: Ten Essential Tools for Hacking Wireless Networks.
Chapter 17: Ten Wireless Security–Testing Mistakes.
Chapter 18: Ten Tips for Following Up after Your Testing.
Part V: Appendixes.
Appendix A: Wir
eless Hacking Resources.
Appendix B: Glossary of Acronyms.
Index.
Nota biograficzna:
Kevin Beaver, CISSP, is a 16–year specialist in security assessments and incident response.
Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.
Okładka tylna:
Become a cyber–hero know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient not only for you, but also for those nefarious types who′d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network′s armor.
Discover how toPerform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy