Hacking Exposed Wireless (Electronic book text)

,

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.Understand the concepts behind RF electronics, Wi-Fi/802.11, and BluetoothFind out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networksDefend against WEP key brute-force, aircrack, and traffic injection hacksCrack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cyclesPrevent rogue AP and certificate authentication attacksPerform packet injection from LinuxLaunch DoS attacks using device driver-independent toolsExploit wireless device drivers using the Metasploit 3.0 FrameworkIdentify and avoid malicious hotspotsDeploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys


Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.Understand the concepts behind RF electronics, Wi-Fi/802.11, and BluetoothFind out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networksDefend against WEP key brute-force, aircrack, and traffic injection hacksCrack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cyclesPrevent rogue AP and certificate authentication attacksPerform packet injection from LinuxLaunch DoS attacks using device driver-independent toolsExploit wireless device drivers using the Metasploit 3.0 FrameworkIdentify and avoid malicious hotspotsDeploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

McGraw-Hill/Osborne Media

Country of origin

United States

Release date

February 2007

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

Authors

,

Format

Electronic book text

Pages

386

ISBN-13

978-5-551-69439-7

Barcode

9785551694397

Categories

LSN

5-551-69439-9



Trending On Loot