It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 02530cam 2200361Ii 4500
001 9925206913901661
005 20150807083359.3
008 150227s2015 nyua 001 0 eng d
019 $a893451339$a913098920
020 $a0071827633$q(paperback)
020 $a9780071827638$q(paperback)
035 $a99964468321
035 $a(OCoLC)904182480$z(OCoLC)893451339$z(OCoLC)913098920
035 $a(OCoLC)ocn904182480
040 $aYDXCP$beng$erda$cYDXCP$dZQP$dJOY$dOCLCF$dSAD$dBTCTA$dBDX$dOCLCQ
050 4 $aTK5103.2$b.W77 2015
100 1 $aWright, Joshua,$eauthor.
245 10 $aHacking exposed wireless :$bwireless security secrets and solutions /$cJoshua Wright, Johnny Cache.
250 $aThird edition.
264 1 $aNew York :$bMcGraw-Hill Education,$c[2015]
264 4 $c℗♭2015
300 $axxii, 519 pages :$billustrations ;$c24 cm
336 $atext$btxt$2rdacontent
337 $aunmediated$bn$2rdamedia
338 $avolume$bnc$2rdacarrier
500 $aIncludes index.
520 $aExploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. This book features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.
505 0 $aPart I: Hacking 802.11 wireless technology. Introduction to 802.11 hacking ; Scanning and enumerating 802.11 networks ; Attacking 802.11 wireless networks ; Attacking WPA-protected 802.11 networks ; Attacking 802.11 wireless clients ; Taking it all the way: bridging the air-gap from Windows 8 -- Part II: Bluetooth. Bluetooth classic scanning and reconnaissance ; Bluetooth Low Energy scanning and reconnaissance ; Bluetooth eavesdropping ; Attacking and exploiting Bluetooth -- Part III: More ubiquitous wireless. Software-Defined Radios ; Hacking cellular networks ; Hacking ZigBee ; Hacking Z-Wave smart homes.
650 0 $aWireless communication systems$xSecurity measures.
650 0 $aWireless LANs$xSecurity measures.
700 1 $aCache, Johnny,$eauthor.
947 $hCIRCSTACKS$r31786103011562
980 $a99964468321