Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu.
Material type: TextSeries: Hacking exposedPublication details: New York : London : McGraw-Hill Professional ; McGraw-Hill [distributor], c2010Edition: 2nd edDescription: xxv, 484 p. : ill. ; 24 cmISBN: 9780071666619 (pbk.) ; 0071666613 (pbk.) Subject(s): Wireless communication systems -- Security measures | Wireless LANs -- Security measuresDDC classification: 005.8 LOC classification: TK5103.2 | .C33 2010Online resources: Companion website with bonus materials including source code, scripts, and high-resolution images : Summary: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APIIT Library Open Shelf | Book | TK5103.2 .C33 2010 c.2 (Browse shelf (Opens below)) | 2 | To be processed (No use restrictions) | 00007159 | |
General Circulation | APU Library Open Shelf | Book | TK5103.2 .C33 2010 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00007160 |
Formerly CIP. Uk
A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .
Includes bibliographical references and index.
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
There are no comments on this title.