Imagen de Google Jackets
Vista normal Vista MARC

Hacking exposed wireless : wireless security secrets & solutions / Johnny Cache, Joshua Wright, Vincent Liu.

Por: Colaborador(es): Tipo de material: TextoTextoEditor: New York ; Mexico City : McGraw-Hill, 2010Fecha de copyright: ©2010Edición: Second editionDescripción: xxv, 484 páginas : ilustraciones ; 24 cmTipo de contenido:
  • texto
Tipo de medio:
  • sin medio
Tipo de soporte:
  • volumen
ISBN:
  • 9780071666619 (alk. paper)
  • 0071666613 (alk. paper)
Otro título:
  • wireless security secrets & solutions [Parte del título]
  • wireless security secrets and solutions [Parte del título]
Tema(s): Clasificación LoC:
  • TK 5103.2 C33.2010
Recursos en línea: Resumen: "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Colección Signatura topográfica Copia número Estado Fecha de vencimiento Código de barras
Libros Biblioteca Francisco Xavier Clavigero Acervo Acervo General TK 5103.2 C33.2010 (Navegar estantería(Abre debajo)) ej. 1 Disponible UIA125516

A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com.

Incluye referencias bibliográficas e índice.

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]