Fr. 46.90

Hacking Wireless Networks for Dummies

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more

Informationen zum Autor Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response. Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years. Klappentext Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."-Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.Discover how to* Perform ethical hacks without compromising a system* Combat denial of service and WEP attacks* Understand how invaders think* Recognize the effects of different hacks* Protect against war drivers and rogue devices Zusammenfassung Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."-Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.Discover how to* Perform ethical hacks without compromising a system* Combat denial of service and WEP attacks* Understand how invaders think* Recognize the effects of different hacks* Protect against war drivers and rogue devices Inhaltsverzeichnis Foreword.Introduction.Part I: Building the Foundation for Testing Wireless Networks.Chapter 1: Introduction to Wireless Hacking.Chapter 2: The Wireless Hacking Process.Chapter 3: Implementing a Testing Methodology.Chapter 4: Amassing Your War Chest.Part II: Getting Rolling with Common Wi-Fi Hacks.Chapter 5: Human (In)Security.Chapter 6: Containing the Airwaves.Chapter 7: Hacking Wireless Clients.Chapter 8: Discovering Default Settings.Chapter 9: Wardriving.Part III: Advanced Wi-Fi Hacks.Chapter 10: Still at War.Chapter 11: Unauthorized Wireless Devices.Chapter 12: Network Attacks.Chapter 13: Denial-of-Service Attacks.Chapter 14: Cracking Encryption.Chapter 15: Authenticating Users.Part IV: The Part of Tens.Chapter 16: Ten Essential Tools for Hacking Wireless Networks.Chapter 17: Ten Wireless Security-Testing Mistakes.Chapter 18: Ten Tips for Following Up after Your Testing.Part V: Appendixes.Appendix A: Wireless Hacking Resources.Appendix B: Glossary of Acronyms.Index....

List of contents

Foreword.
 
Introduction.
 
Part I: Building the Foundation for Testing Wireless Networks.
 
Chapter 1: Introduction to Wireless Hacking.
 
Chapter 2: The Wireless Hacking Process.
 
Chapter 3: Implementing a Testing Methodology.
 
Chapter 4: Amassing Your War Chest.
 
Part II: Getting Rolling with Common Wi-Fi Hacks.
 
Chapter 5: Human (In)Security.
 
Chapter 6: Containing the Airwaves.
 
Chapter 7: Hacking Wireless Clients.
 
Chapter 8: Discovering Default Settings.
 
Chapter 9: Wardriving.
 
Part III: Advanced Wi-Fi Hacks.
 
Chapter 10: Still at War.
 
Chapter 11: Unauthorized Wireless Devices.
 
Chapter 12: Network Attacks.
 
Chapter 13: Denial-of-Service Attacks.
 
Chapter 14: Cracking Encryption.
 
Chapter 15: Authenticating Users.
 
Part IV: The Part of Tens.
 
Chapter 16: Ten Essential Tools for Hacking Wireless Networks.
 
Chapter 17: Ten Wireless Security-Testing Mistakes.
 
Chapter 18: Ten Tips for Following Up after Your Testing.
 
Part V: Appendixes.
 
Appendix A: Wireless Hacking Resources.
 
Appendix B: Glossary of Acronyms.
 
Index.

Product details

Authors Beaver, K Beaver, Kevi Beaver, Kevin Beaver, Kevin Davis Beaver, Beaver Kevin, Peter T Davis, Peter T. Davis, Davis Peter T., Davis PT
Assisted by Akin Devin K. (Foreword)
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Paperback / Softback
Released 16.09.2005
 
EAN 9780764597305
ISBN 978-0-7645-9730-5
No. of pages 384
Series For Dummies
Subjects Natural sciences, medicine, IT, technology > IT, data processing

Informatik, Netzwerksicherheit, computer science, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.