Hacking Wireless Networks For Dummies
- 0 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Hacking Wireless Networks For Dummies

 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9780471772224
Veröffentl:
2005
Einband:
E-Book
Seiten:
384
Autor:
Kevin Beaver
eBook Typ:
PDF
eBook Format:
Reflowable E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Become a cyber-hero - know the common wireless weaknesses "e;Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."e; --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices
Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor towardbecoming an experienced wireless security professional."Devin Akin - CTO, The Certified Wireless Network Professional(CWNP) ProgramWireless networks are so convenient - not only for you, but alsofor those nefarious types who'd like to invade them. The only wayto know if your system can be penetrated is to simulate an attack.This book shows you how, along with how to strengthen any weakspots you find in your network's armor.Discover how to:* Perform ethical hacks without compromising a system* Combat denial of service and WEP attacks* Understand how invaders think* Recognize the effects of different hacks* Protect against war drivers and rogue devices
Foreword xviiIntroduction 1Part I: Building the Foundation for Testing Wireless Networks 7Chapter 1: Introduction to Wireless Hacking 9Chapter 2: The Wireless Hacking Process 19Chapter 3: Implementing a Testing Methodology 31Chapter 4: Amassing Your War Chest 43Part II: Getting Rolling with Common Wi-Fi Hacks 65Chapter 5: Human (In)Security 67Chapter 6: Containing the Airwaves 81Chapter 7: Hacking Wireless Clients 97Chapter 8: Discovering Default Settings 113Chapter 9: Wardriving 131Part III: Advanced Wi-Fi Hacks 153Chapter 10: Still at War 155Chapter 11: Unauthorized Wireless Devices 177Chapter 12: Network Attacks 195Chapter 13: Denial-of-Service Attacks 225Chapter 14: Cracking Encryption 255Chapter 15: Authenticating Users 281Part IV: The Part of Tens 301Chapter 16: Ten Essential Tools for Hacking Wireless Networks 303Chapter 17: Ten Wireless Security-Testing Mistakes 307Chapter 18: Ten Tips for Following Up after Your Testing 321Part V: Appendixes 325Appendix A: Wireless Hacking Resources 327Appendix B: Glossary of Acronyms 341Index 347

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.