Hacking exposed wireless : wireless security secrets & solutions / by Johnny Cache, Joshua Wright, Vincent Liu.
Material type: TextSeries: Hacking exposedPublication details: New Delhi : McGraw-Hill, c2010Edition: 2nd edDescription: xxv, 484 p. : ill. ; 24 cmISBN: 9780071070911 (pbk)Subject(s): Wireless communication systems -- Security measures | Wireless LANs -- Security measuresDDC classification: 005.8 Summary: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Namal Library Computer Science | 005.8 CAC-H 2010 2081 (Browse shelf (Opens below)) | Available | 0002081 |
Index included
Includes bibliographical references and index.
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
There are no comments on this title.