Search Books
Hacking Exposed Linux, 3rd … OCA Oracle Application Serv…

Hacking Exposed Wireless: Wireless Security Secrets & Solutions

Author Johnny Cache, Vincent Liu
Publisher McGraw-Hill Osborne Media
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
42.95 49.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $1.14

✓ Usually ships in 1-2 business days

Share:
Book Details
ISBN / ASIN0072262583
ISBN-139780072262582
AvailabilityUsually ships in 1-2 business days
Sales Rank2,416,363
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

  • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
  • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
  • Defend against WEP key brute-force, aircrack, and traffic injection hacks
  • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
  • Prevent rogue AP and certificate authentication attacks
  • Perform packet injection from Linux
  • Launch DoS attacks using device driver-independent tools
  • Exploit wireless device drivers using the Metasploit 3.0 Framework
  • Identify and avoid malicious hotspots
  • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View