skip to content
Hacking wireless networks for dummies Preview this item
ClosePreview this item
Checking...

Hacking wireless networks for dummies

Author: Devin K Akin; Peter T Davis; Kevin Beaver
Publisher: Hoboken, N.J. : John Wiley & Sons, 2013.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Devin K Akin; Peter T Davis; Kevin Beaver
ISBN: 9781118084922 1118084926
OCLC Number: 864465214
Description: 1 online resource
Contents: Foreword. Introduction. Part I: Building the Foundation for Testing Wireless Networks. Chapter 1: Introduction to Wireless Hacking. Chapter 2: The Wireless Hacking Process. Chapter 3: Implementing a Testing Methodology. Chapter 4: Amassing Your War Chest. Part II: Getting Rolling with Common Wi-Fi Hacks. Chapter 5: Human (In)Security. Chapter 6: Containing the Airwaves. Chapter 7: Hacking Wireless Clients. Chapter 8: Discovering Default Settings. Chapter 9: Wardriving. Part III: Advanced Wi-Fi Hacks. Chapter 10: Still at War. Chapter 11: Unauthorized Wireless Devices. Chapter 12: Network Attacks. Chapter 13: Denial-of-Service Attacks. Chapter 14: Cracking Encryption. Chapter 15: Authenticating Users. Part IV: The Part of Tens. Chapter 16: Ten Essential Tools for Hacking Wireless Networks. Chapter 17: Ten Wireless Security-Testing Mistakes. Chapter 18: Ten Tips for Following Up after Your Testing. Part V: Appendixes. Appendix A: Wireless Hacking Resources. Appendix B: Glossary of Acronyms. Index.
Responsibility: Devin K. Akin, Kevin Beaver and Peter T. Davis.

Abstract:

Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/864465214> # Hacking wireless networks for dummies
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "864465214" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2564991774#Place/hoboken_n_j> ; # Hoboken, N.J.
    schema:about <http://id.worldcat.org/fast/872776> ; # Computers
    schema:about <http://experiment.worldcat.org/entity/work/data/2564991774#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/74093411> ; # Kevin Beaver
    schema:contributor <http://viaf.org/viaf/35586377> ; # Peter T. Davis
    schema:creator <http://experiment.worldcat.org/entity/work/data/2564991774#Person/akin_devin_k> ; # Devin K. Akin
    schema:datePublished "2013" ;
    schema:description "Become a cyber-hero - know the common wireless weaknesses"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2564991774> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/2564991774#CreativeWork/> ;
    schema:name "Hacking wireless networks for dummies"@en ;
    schema:productID "864465214" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/864465214#PublicationEvent/hoboken_n_j_john_wiley_&_sons_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/2564991774#Agent/john_wiley_&_sons> ; # John Wiley & Sons
    schema:url <http://rbdigital.oneclickdigital.com> ;
    schema:workExample <http://worldcat.org/isbn/9781118084922> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/864465214> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2564991774#Agent/john_wiley_&_sons> # John Wiley & Sons
    a bgn:Agent ;
    schema:name "John Wiley & Sons" ;
    .

<http://experiment.worldcat.org/entity/work/data/2564991774#Person/akin_devin_k> # Devin K. Akin
    a schema:Person ;
    schema:familyName "Akin" ;
    schema:givenName "Devin K." ;
    schema:name "Devin K. Akin" ;
    .

<http://experiment.worldcat.org/entity/work/data/2564991774#Place/hoboken_n_j> # Hoboken, N.J.
    a schema:Place ;
    schema:name "Hoboken, N.J." ;
    .

<http://experiment.worldcat.org/entity/work/data/2564991774#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.worldcat.org/fast/872776> # Computers
    a schema:Intangible ;
    schema:name "Computers"@en ;
    .

<http://viaf.org/viaf/35586377> # Peter T. Davis
    a schema:Person ;
    schema:familyName "Davis" ;
    schema:givenName "Peter T." ;
    schema:name "Peter T. Davis" ;
    .

<http://viaf.org/viaf/74093411> # Kevin Beaver
    a schema:Person ;
    schema:familyName "Beaver" ;
    schema:givenName "Kevin" ;
    schema:name "Kevin Beaver" ;
    .

<http://worldcat.org/isbn/9781118084922>
    a schema:ProductModel ;
    schema:isbn "1118084926" ;
    schema:isbn "9781118084922" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.