McGraw-Hill Hacking Exposed Wireless, Second Edition

McGraw-Hill Hacking Exposed Wireless, Second Edition

MPN: 9780071666619
发送方式:
交货来源:
德国
更新价格... 📣 询问价格 Не поставляется
运输成本:
От

凡购买和价格 (Advertising *)

顶部
в наличии
* Alle Preise inkl. der jeweils geltenden gesetzlichen Mehrwertsteuer, ggfs. zzgl. Versandkosten. Alle Angaben ohne Gewähr. Preisänderungen sind in der Zwischenzeit möglich.

技术特点

顶部

技术细节

分类 Networking software
发行人 McGraw-Hill
页数 512
作者 Johnny Cache Joshua Wright Vincent Liu

另外

发布日期 2010
The latest techniques for securing wireless networks using the proven Hacking Exposed methodology

Filled with detailed instructions for attacking wireless technology, Hacking Exposed Wireless, Second Edition shows you how attackers break into wireless systems step-by-step, leveraging weaknesses in WPA2, enterprise authentication, client deficiencies and more. In this fully revised book, the authors? debut advanced wireless attack techniques including Bridging the Airgap exploits with straightforward explanations and practical implementation techniques.

For the first time in print, comprehensive coverage on attacking non-WiFi networks is also included, helping organizations recognize threats beyond wireless LAN networks. Covering Bluetooth, DECT and ZigBee exploits, the authors take you through the process of understanding the qualities and benefits of the technology, starting with simple and advancing to complex attacks.

For each attack, the authors? help you view the wireless technology from the eyes of an attacker, demonstrating how widely deployed and critical wireless technology can be manipulated. After fully engrossing the reader in the ability to hack a given wireless technology, they help you understand what can be done to defend against the attack as well through additional defenses, workarounds, detection and mitigation techniques.

Hacking Exposed Wireless, Second Edition features:

- Comprehensive coverage for attacking and defending 802.11, Bluetooth, ZigBee and DECT networks
- Content written by the same wireless security experts who have written and published many of the wireless attack tools used today
- Detailed attack walkthroughs for emerging and advanced techniques leveraged by attackers to gain a foothold into modern networks
- Patches, workarounds and recommendations for effectively leveraging open-source wireless exploit tools
- Global examples throughout

Comprehensive coverage of wireless network security:

802.11 in a Nutshell, WLAN Discovery Techniques, 802.11 Hardware Solutions, Building an Attack Platform on Windows, Linux, OS X, Mobile Discovery Tools, Online Mapping Services, Defeating WLAN Obscurity, Cracking WEP, Breaking WPA2-PSK, Breaking Enterprise WPA, Exploiting EAP Authentication Methods, Breaking WLAN Encryption, Exploiting DNS over Wireless, WLAN Man-in-the-Middle Attacks, Dynamic Attacks with Karmetasploit, Manipulating Client Drivers, Exploiting Client Software Updates, Web Hacking and WiFi, Leveraging Compromised OS X Clients, Leveraging Compromised Windows Clients, Bluetooth Scanning and Reconnaissance, Bluetooth Device Enumeration, Active and Passive Bluetooth Device Discovery, Sniffing Bluetooth Networks, Leveraging Software Defined Radio for Wireless Attacks, Exploiting Bluetooth PINs, Manipulating Bluetooth Identities, Abusing Bluetooth Profiles, Introduction to ZigBee, ZigBee's Security Model, Exploiting ZigBee with KillerBee, ZigBee Hardware Exploits, DECT Cordless Phone Introduction, Exploiting DECT Pairing and Authentication, DECT Audio Eavesdropping Attacks, Effectively Scoping a Wireless Security Engagement.
Фотографии

    密码恢复
    要恢复您的密码,请在下面您的电子邮件地址框与您已注册请输入:
    The password reset code has been sent to your Email.
    Код уже был отправлен Вам ранее.
    Вы можете ввести его в поле выше, или получить новый код через сек.
    发生了错误。请检查您的电子邮件地址,然后再试一次。
    Ваш новый пароль:

    名称为空


    Выберите страну доставки

    您还没有写消息

    By clicking on the "Send" button, you agree that your data will be used to process your request. Further information and revocation instructions can be found in the data protection declaration.

    已发送您的消息!

    親密

    1
    产品目录
    取消
    Бренды:
      Выберите бренды
        查看更多
          地區搜索
          全球
          Категории
            产品名称