Hacking Exposed Wireless, Second Edition Wireless Security Secrets and Solutions

, by ; ;
Hacking Exposed Wireless, Second Edition Wireless Security Secrets and Solutions by Cache, Johnny; Wright, Joshua; Liu, Vincent, 9780071666619
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780071666619 | 0071666613
  • Cover: Paperback
  • Copyright: 7/9/2010

  • Buy New

    Print on Demand: 2-4 Weeks. This item cannot be cancelled or returned.

    $52.82

The latest techniques for securing wireless networks using the proven the Hacking Exposed methodologyFilled with tactical security information,Hacking Exposed Wireless, Second Editionsheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. The book includes vital details on new, previously unpublished attacks alongside real-world, proven countermeasures. Seven new chapters discuss in depth how to conduct an assessment from start to finish, secure Bluetooth networks, write custom wireless security tools, and ensure compliance with the latest wireless laws and regulations.Hacking Exposed Wireless, Second Editionfeatures: Thorough updates for the latest wireless threats and techniques Information on wireless laws and regulations including how to meet PCI wireless security requirements Content written by world-renowned wireless security experts Global examples throughoutComprehensive coverage of wireless network security: Wireless Fundamentals; An Overview of Wireless Security; Radio Frequency Fundamentals; Introduction to 802.11; Hacking 802.11 Wireless Networks; Building Your Wireless Hacking Toolkits; Scoping and Information Gathering; Discovering Wireless Targets; Scanning and Enumeration of 802.11 Networks; Attacking 802.11 Wireless Networks; Attacking WPA-protected 802.11 Networks; Attacking 802.11 Wireless Clients; Defending Your Wireless Network; Hacking Additional Wireless Technologies; Hacking Hotspots; Bluetooth Basics; Attacking Bluetooth Security; Other Wireless Protocols; Writing Your Own Wireless Security Tools; Wireless Hacking Laws and Regulations
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button