000 02376cam a2200373 a 4500
999 _c11309
_d11309
001 16334195
003 OSt
005 20180206113921.0
008 100715s2010 nyua b 001 0 eng
010 _a 2010027293
015 _aGBB069693
_2bnb
016 7 _a015571691
_2Uk
020 _a9780071666619 (alk. paper)
020 _a0071666613 (alk. paper)
035 _a(OCoLC)ocn640078077
040 _aDLC
_cDLC
_dBTCTA
_dYDXCP
_dUKM
_dC#P
_dBWX
_dEINCP
_dDLC
050 0 0 _aTK5103.2
_b.C23 2010
082 0 0 _a005.8
_222
100 1 _aCache, Johnny.
_922652
245 1 0 _aHacking exposed wireless :
_bwireless security secrets & solutions /
_cJohnny Cache, Joshua Wright, Vincent Liu.
250 _a2nd ed.
260 _aNew York :
_bMcGraw-Hill,
_cc2010.
300 _axxv, 484 p. :
_bill. ;
_c24 cm.
490 0 _aHacking exposed
500 _aA companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .
504 _aIncludes bibliographical references and index.
520 _a"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
650 0 _aWireless communication systems
_xSecurity measures.
_922653
650 0 _aWireless LANs
_xSecurity measures.
_922654
700 1 _aWright, Joshua.
_922655
700 1 _aLiu, Vincent.
_922656
856 4 2 _3Companion website with bonus materials including source code, scripts, and high-resolution images :
_uhttp://www.hackingexposedwireless.com
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2ddc
_cBK