Beaver / Davis | Hacking Wireless Networks For Dummies | E-Book | sack.de
E-Book

E-Book, Englisch, 384 Seiten, E-Book

Beaver / Davis Hacking Wireless Networks For Dummies

E-Book, Englisch, 384 Seiten, E-Book

ISBN: 978-1-118-08492-2
Verlag: John Wiley & Sons
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Become a cyber-hero - know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor towardbecoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional(CWNP) Program
Wireless networks are so convenient - not only for you, but alsofor those nefarious types who'd like to invade them. The only wayto know if your system can be penetrated is to simulate an attack.This book shows you how, along with how to strengthen any weakspots you find in your network's armor.
Discover how to:
* Perform ethical hacks without compromising a system
* Combat denial of service and WEP attacks
* Understand how invaders think
* Recognize the effects of different hacks
* Protect against war drivers and rogue devices
Beaver / Davis Hacking Wireless Networks For Dummies jetzt bestellen!

Weitere Infos & Material


Foreword.
Introduction.
Part I: Building the Foundation for Testing WirelessNetworks.
Chapter 1: Introduction to Wireless Hacking.
Chapter 2: The Wireless Hacking Process.
Chapter 3: Implementing a Testing Methodology.
Chapter 4: Amassing Your War Chest.
Part II: Getting Rolling with Common Wi-Fi Hacks.
Chapter 5: Human (In)Security.
Chapter 6: Containing the Airwaves.
Chapter 7: Hacking Wireless Clients.
Chapter 8: Discovering Default Settings.
Chapter 9: Wardriving.
Part III: Advanced Wi-Fi Hacks.
Chapter 10: Still at War.
Chapter 11: Unauthorized Wireless Devices.
Chapter 12: Network Attacks.
Chapter 13: Denial-of-Service Attacks.
Chapter 14: Cracking Encryption.
Chapter 15: Authenticating Users.
Part IV: The Part of Tens.
Chapter 16: Ten Essential Tools for Hacking WirelessNetworks.
Chapter 17: Ten Wireless Security-Testing Mistakes.
Chapter 18: Ten Tips for Following Up after Your Testing.
Part V: Appendixes.
Appendix A: Wireless Hacking Resources.
Appendix B: Glossary of Acronyms.
Index.


Kevin Beaver, CISSP, is a 16-year specialist in securityassessments and incident response.
Peter T. Davis, CISSP, has worked with informationsystems audits and security for 24 years.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.