Keyword : Category :
 
 
 
 
Windows
Unix
Php and mysql
Linux
Java
Mobile programming
Certification
Asterisk
Python
Autocad
3d-animation
Hacks
Programming
Hardware
Networking
Web design
Multimedia - graphics
Simple steps
Dummies
.net programming
Oracle
Sql server
Operating system
Telecommunications
Microsoft
Office
Web development
Cisco
Graphics
C sharp
Software development
Database
Computer science
Uml
Security
General
Cms
Mac
Android
 
 
Email:
 
 
No bestsellers available!
 
Book details / order
HACKING EXPOSED WIRELESS
Secure your wireless networks the hacking exposed way defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. hacking exposed wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. find out how to plug security holes in wi-fi/802.11 and bluetooth systems and devices. you'll also learn how to launch wireless exploits from metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. the book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. understand the concepts behind rf electronics, wi-fi/802.11, and bluetooth find out how hackers use netstumbler, wispy, kismet, kismac, and airopeek to target vulnerable wireless networks defend against wep key brute-force, aircrack, and traffic injection hacks crack wep at new speeds using field programmable gate arrays or your spare ps3 cpu cycles prevent rogue ap and certificate authentication attacks perform packet injection from linux launch dos attacks using device driver-independent tools exploit wireless device drivers using the metasploit 3.0 framework identify and avoid malicious hotspots deploy wpa/802.11i authentication and encryption using peap, freeradius, and wpa pre-shared keys. new features: how attackers identify and exploit wireless network weaknesses so you can locate, exploit and defend wireless systems the tools and techniques hackers use to penetrate wireless networks today written with a focus on the real-world enterprise environment, with situations and solutions taken from field experiences. advanced 802.11 attacks, including some new unpublished attacks debuted here directed attacks against wireless network access points used to gain total control over the wireless environment advanced penetration techniques for bluetooth enabled devices in addition to 3g wireless application attacks the only wireless security book that covers the spectrum of wireless technolies: wifi/802.11, bluetooth, irda, 3g wireless, rfid, wimax and more are covered. table of contents: part i: overview chapter 1: wireless security overview chapter 2: radio frequency part ii: hacking 802.11 wireless technology chapter 3: introduction to 802.11 chapter 4: 802.11 discovery chapter 5: scanning and enumerating 802.11 networks chapter 6: attacking 802.11 networks chapter 7: attacking wpa-protected 802.11 networks chapter 8: 802.11 defense part iii: hacking additional wireless technologies chapter 9: hacking hotspots chapter 10: the potential threat of bluetooth chapter 11: advanced attacks

Author : Cache, johnny; liu, vincent
Publication : Tata
Isbn : 978-0-07-065906-3
Store book number : 106
NRS 792.00
  
Order This Book
*Marked Field Is Necessary
Your Name: *
Your Address:
Your Email: *
Your Cell Phone:
Your Work Phone:
Quantity: *
Total:
Message (if any)
Security code: *
Case Sensitive
 
 
Packt publication
Microsoft press
Wrox
Bpb
Phi
Dreamtech press
Sybex
Wiley
Tata
Oreilly
Macmilan
Vikas
Apress
Spd
Pearson
Cambridge
Oxford
Idg
Charles river media
Murach
Niit
Black book
Bible
Elsevier
Sk kataria
Pragmatic bookshelf
Fusion books
 
 
HEAD FIRST KOTLIN: A BRAIN-FRIENDLY GUIDE
NRS 2600.00
 
 
Professional ASP.NET MVC 4
Mastering Microsoft Exchange ...
Android Hacker's Handbook
CCNA Cisco Certified Network ...
Windows Phone 7 Application ...
Beginning Drupal (Wrox Progr ...
Troubleshooting Windows 7 In ...
 More>>
 
All Right Reserved © bookplus.com.np 2008