Book by Haines Brad
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
"Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them."--Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London
"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples―they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.
This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.
Attacks detailed in this book include:
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Versand:
Gratis
Innerhalb der USA
Versand:
EUR 2,92
Innerhalb der USA
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 0.8. Bestandsnummer des Verkäufers G1597495417I4N00
Anzahl: 1 verfügbar
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
Paperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.8. Bestandsnummer des Verkäufers G1597495417I3N00
Anzahl: 1 verfügbar
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Zustand: Very Good. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects. Bestandsnummer des Verkäufers GRP85624367
Anzahl: 1 verfügbar
Anbieter: GF Books, Inc., Hawthorne, CA, USA
Zustand: Good. Book is in Used-Good condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain limited notes and highlighting. 1.1. Bestandsnummer des Verkäufers 1597495417-2-4
Anzahl: 1 verfügbar
Anbieter: GF Books, Inc., Hawthorne, CA, USA
Zustand: Very Good. Book is in Used-VeryGood condition. Pages and cover are clean and intact. Used items may not include supplementary materials such as CDs or access codes. May show signs of minor shelf wear and contain very limited notes and highlighting. 1.1. Bestandsnummer des Verkäufers 1597495417-2-3
Anzahl: 1 verfügbar
Anbieter: Book Deals, Tucson, AZ, USA
Zustand: Very Good. Very Good condition. Shows only minor signs of wear, and very minimal markings inside (if any). 1.1. Bestandsnummer des Verkäufers 353-1597495417-vrg
Anzahl: 1 verfügbar
Anbieter: Books Unplugged, Amherst, NY, USA
Zustand: Good. Buy with confidence! Book is in good condition with minor wear to the pages, binding, and minor marks within 1.1. Bestandsnummer des Verkäufers bk1597495417xvz189zvxgdd
Anzahl: 1 verfügbar
Anbieter: GoldenDragon, Houston, TX, USA
Paperback. Zustand: new. Buy for Great customer experience. Bestandsnummer des Verkäufers GoldenDragon1597495417
Anzahl: 1 verfügbar
Anbieter: GF Books, Inc., Hawthorne, CA, USA
Zustand: New. Book is in NEW condition. 1.1. Bestandsnummer des Verkäufers 1597495417-2-1
Anzahl: 1 verfügbar
Anbieter: Big Bill's Books, Wimberley, TX, USA
Paperback. Zustand: new. Brand New Copy. Bestandsnummer des Verkäufers BBB_new1597495417
Anzahl: 1 verfügbar