Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: * Perform ethical hacks…mehr
Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: * Perform ethical hacks without compromising a system * Combat denial of service and WEP attacks * Understand how invaders think * Recognize the effects of different hacks * Protect against war drivers and rogue devices
Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response. Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.
Inhaltsangabe
Foreword xvii Introduction 1 Part I: Building the Foundation for Testing Wireless Networks 7 Chapter 1: Introduction to Wireless Hacking 9 Chapter 2: The Wireless Hacking Process 19 Chapter 3: Implementing a Testing Methodology 31 Chapter 4: Amassing Your War Chest 43 Part II: Getting Rolling with Common Wi-Fi Hacks 65 Chapter 5: Human (In)Security 67 Chapter 6: Containing the Airwaves 81 Chapter 7: Hacking Wireless Clients 97 Chapter 8: Discovering Default Settings 113 Chapter 9: Wardriving 131 Part III: Advanced Wi-Fi Hacks 153 Chapter 10: Still at War 155 Chapter 11: Unauthorized Wireless Devices 177 Chapter 12: Network Attacks 195 Chapter 13: Denial-of-Service Attacks 225 Chapter 14: Cracking Encryption 255 Chapter 15: Authenticating Users 281 Part IV: The Part of Tens 301 Chapter 16: Ten Essential Tools for Hacking Wireless Networks 303 Chapter 17: Ten Wireless Security-Testing Mistakes 307 Chapter 18: Ten Tips for Following Up after Your Testing 321 Part V: Appendixes 325 Appendix A: Wireless Hacking Resources 327 Appendix B: Glossary of Acronyms 341 Index 347
Foreword xvii Introduction 1 Part I: Building the Foundation for Testing Wireless Networks 7 Chapter 1: Introduction to Wireless Hacking 9 Chapter 2: The Wireless Hacking Process 19 Chapter 3: Implementing a Testing Methodology 31 Chapter 4: Amassing Your War Chest 43 Part II: Getting Rolling with Common Wi-Fi Hacks 65 Chapter 5: Human (In)Security 67 Chapter 6: Containing the Airwaves 81 Chapter 7: Hacking Wireless Clients 97 Chapter 8: Discovering Default Settings 113 Chapter 9: Wardriving 131 Part III: Advanced Wi-Fi Hacks 153 Chapter 10: Still at War 155 Chapter 11: Unauthorized Wireless Devices 177 Chapter 12: Network Attacks 195 Chapter 13: Denial-of-Service Attacks 225 Chapter 14: Cracking Encryption 255 Chapter 15: Authenticating Users 281 Part IV: The Part of Tens 301 Chapter 16: Ten Essential Tools for Hacking Wireless Networks 303 Chapter 17: Ten Wireless Security-Testing Mistakes 307 Chapter 18: Ten Tips for Following Up after Your Testing 321 Part V: Appendixes 325 Appendix A: Wireless Hacking Resources 327 Appendix B: Glossary of Acronyms 341 Index 347
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309