Book by Hurley Chris Rogers Russ Thornton Frank Baker Bria
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester’s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Versand:
Gratis
Innerhalb der USA
Versand:
EUR 3,57
Innerhalb der USA
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.5. Bestandsnummer des Verkäufers G159749111XI3N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 1.5. Bestandsnummer des Verkäufers G159749111XI4N10
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 1.5. Bestandsnummer des Verkäufers G159749111XI3N00
Anzahl: 1 verfügbar
Anbieter: SecondSale, Montgomery, IL, USA
Zustand: Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00074918024
Anzahl: 1 verfügbar
Anbieter: medimops, Berlin, Deutschland
Zustand: very good. Gut/Very good: Buch bzw. Schutzumschlag mit wenigen Gebrauchsspuren an Einband, Schutzumschlag oder Seiten. / Describes a book or dust jacket that does show some signs of wear on either the binding, dust jacket or pages. Bestandsnummer des Verkäufers M0159749111X-V
Anzahl: 1 verfügbar
Anbieter: Ergodebooks, Houston, TX, USA
Softcover. Zustand: Good. 1. Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Testers Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks. Bestandsnummer des Verkäufers SONG159749111X
Anzahl: 1 verfügbar
Anbieter: GoldenWavesOfBooks, Fayetteville, TX, USA
Paperback. Zustand: new. New. Fast Shipping and good customer service. Bestandsnummer des Verkäufers Holz_New_159749111X
Anzahl: 1 verfügbar
Anbieter: Wizard Books, Long Beach, CA, USA
Paperback. Zustand: new. New. Bestandsnummer des Verkäufers Wizard159749111X
Anzahl: 1 verfügbar
Anbieter: Front Cover Books, Denver, CO, USA
Zustand: new. Bestandsnummer des Verkäufers FrontCover159749111X
Anzahl: 1 verfügbar
Anbieter: Big Bill's Books, Wimberley, TX, USA
Paperback. Zustand: new. Brand New Copy. Bestandsnummer des Verkäufers BBB_new159749111X
Anzahl: 1 verfügbar