Hacking exposed wireless : wireless security secrets & solutions / by Johnny Cache, Joshua Wright, Vincent Liu.

By: Cache, JohnnyContributor(s): Wright, Joshua | Liu, VincentMaterial type: TextTextSeries: Hacking exposedPublication details: New Delhi : McGraw-Hill, c2010Edition: 2nd edDescription: xxv, 484 p. : ill. ; 24 cmISBN: 9780071070911 (pbk)Subject(s): Wireless communication systems -- Security measures | Wireless LANs -- Security measuresDDC classification: 005.8 Summary: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
005.8 CAC-H 2010 2081 (Browse shelf (Opens below)) Available 0002081
Total holds: 0

Index included

Includes bibliographical references and index.

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]

There are no comments on this title.

to post a comment.