Search Books
Network and System Security Seven Deadliest Social Netw…

Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks)

Author Brad Haines
Publisher Syngress
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
26.95 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $8.97

✓ Usually ships in 24 hours

Share:
Book Details
Author(s)Brad Haines
PublisherSyngress
ISBN / ASIN1597495417
ISBN-139781597495417
AvailabilityUsually ships in 24 hours
Sales Rank1,261,992
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the different attacks against popular wireless protocols and systems. Each chapter includes an example real attack scenario; an analysis of the attack; and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office.
The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; along with attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. One chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.
This book is intended for novices and anyone in a technical role either as the family tech support to corporate IT managers. It also assumes some familiarity with basic networking and computer use.

Attacks detailed in this book include:

  1. 802.11 Wireless-Infrastructure Attacks
  2. 802.11 Wireless-Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View