Hacking exposed wireless: wireless security secrets & solutions
โ Scribed by Cache, Johnny;Wright, Joshua
- Publisher
- McGraw-Hill Education
- Year
- 2015
- Tongue
- English
- Edition
- 3e edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
PART 1: WI-FI1. Introduction to 802.11 Hacking2. Scanning and Enumerating 802.11 Networks3. Attacking 802.11 Wireless Networks4. Attacking WPA-Protected 802.11 Networks5. Attacking 802.11 Wireless Clients6. Taking It All the Way: Bridging the Airgap from Windows 8PART 2: BLUETOOTH7. Bluetooth Classic Scanning and Reconnaissance8. Bluetooth Low Energy Scanning and Reconnaissance9. Bluetooth Eavesdropping10. Attacking and Exploiting BluetoothPART 3: MORE UBIQUITOUS WIRELESS11. Software-Defined Radios (SDRs)12. Hack Cellular Network13. Hack ZigBee14. Hack Z-Wave Smart Homes
โฆ Subjects
Wireless communication systems--Security measures;Wireless LANs--Security measures;Electronic books;Wireless communication systems -- Security measures;Wireless LANs -- Security measures
๐ SIMILAR VOLUMES
Including vital details on new, previously unpublished attacks alongside real-world countermeasures, this book offers tactical security information that will help you defend against the latest pervasive and devastating wireless attacks
Hacking Exposed Wireless is built on the same template as the other excellent books in the Hacking Exposed series. I find the book very informative, and I'll keep it close, when I'll perform WiFi testing on the corporate network. The Attack and Countermeasure sections in the chapters of the Hacking
<h4>The latest wireless security solutions</h4> <p>Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, <i>Hacking Exposed Wireless</i>, second ed