Atjaunināt sīkdatņu piekrišanu

E-grāmata: Hacking Exposed Wireless

3.99/5 (111 ratings by Goodreads)
  • Formāts: 386 pages
  • Sērija : Hacking Exposed
  • Izdošanas datums: 10-Apr-2007
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071509695
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 75,68 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 386 pages
  • Sērija : Hacking Exposed
  • Izdošanas datums: 10-Apr-2007
  • Izdevniecība: McGraw-Hill Professional
  • Valoda: eng
  • ISBN-13: 9780071509695
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

  • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
  • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
  • Defend against WEP key brute-force, aircrack, and traffic injection hacks
  • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
  • Prevent rogue AP and certificate authentication attacks
  • Perform packet injection from Linux
  • Launch DoS attacks using device driver-independent tools
  • Exploit wireless device drivers using the Metasploit 3.0 Framework
  • Identify and avoid malicious hotspots
  • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys
Part I: 802.11 Wireless TechnologyChapter 1: Hacking 802.11Chapter 2: Discover and VerifyChapter 3: Capture and AnalyzeChapter 4: Basic AttacksChapter 5: Decryption AttacksChapter 6: Authentication AttacksChapter 7: Man-In-The-Middle attacksChapter 8: VPN AttacksChapter 9: Denial of ServiceChapter 10: 802.11 Intrusion Detection and PreventionChapter 11: 802.11 DefensesChapter 12: Other 802.11 related attacksPart II: Other Wireless TechnologiesChapter 13: Hacking BluetoothChapter 14: 3G Wireless ServicesChapter 15: Text Service InterceptionChapter 16: Scanners and RF MonitoringChapter 17: IRDA
Chapter 18: RFIDChapter 19: Emerging Technologies
Johnny Cache (Virginia) received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then he has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. He has also released a number of papers related to 802.11 security, and is the author of many wireless tools. He is the founder and Chief Science Officer of Cache Heavy Industries.





McGraw-Hill authors represent the leading experts in their fields and are dedicated to improving the lives, careers, and interests of readers worldwide