It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-031.mrc:36306390:5687
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:36306390:5687?format=raw

LEADER: 05687cam a22006854a 4500
001 15069040
005 20220703231514.0
006 m o d
007 cr |n|||||||||
008 050603s2006 flua ob 001 0 eng c
035 $a(OCoLC)ocm77564247
035 $a(NNC)15069040
040 $aCOO$beng$epn$cCOO$dN$T$dYDXCP$dCUSER$dVLB$dE7B$dOCLCQ$dOCLCF$dOCLCO$dCRCPR$dOCLCQ$dIDEBK$dWAU$dBAKER$dWPG$dOCLCO$dCNNAI$dOCLCQ$dPIFBY$dOTZ$dOCLCQ$dUAB$dERL$dOCLCQ$dCEF$dUPM$dNLE$dUKMGB$dWYU$dS9I$dYDX$dTYFRS$dLEAUB$dUKAHL$dOCLCQ$dUHL$dOCLCO
015 $aGBA571603$2bnb
015 $aGBB7D1362$2bnb
016 7 $a018434712$2Uk
016 7 $z013279362$2Uk
019 $a69243479$a148808776$a326736168$a647595326$a858415140$a992057339$a995037421$a1006805308$a1031040116$a1065668241
020 $a0849333784$q(alk. paper)
020 $a9780849333781
020 $a142003118X$q(electronic bk.)
020 $a9781420031188$q(electronic bk.)
024 7 $a10.1201/9781420031188$2doi
035 $a(OCoLC)77564247$z(OCoLC)69243479$z(OCoLC)148808776$z(OCoLC)326736168$z(OCoLC)647595326$z(OCoLC)858415140$z(OCoLC)992057339$z(OCoLC)995037421$z(OCoLC)1006805308$z(OCoLC)1031040116$z(OCoLC)1065668241
037 $aTANDF_183256$bIngram Content Group
042 $apcc
050 4 $aTK5105.78$b.E23 2006
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$222
049 $aZCUA
100 1 $aEarle, Aaron E.
245 10 $aWireless security handbook /$cAaron E. Earle.
260 $aBoca Raton, FL :$bAuerbach,$c2006.
300 $a1 online resource (xv, 366 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $adata file$2rda
500 $aIncludes index.
505 0 $aWireless Network Overview; RF Overview; Wireless Signal Propagation; Signal-to-Noise Ratio; Modulation; Wireless Groups; ; Risks and Threats of Wireless; Goals of Information Security; Analysis; Spoofing; Denial of Service; Malicious Code; Social Engineering; Rogue Access Points; Cell Phone Security; Wireless Hacking and Hackers; RFID; ; The Legality of Computer Crime; Electronic Communications Privacy Act; Computer Fraud and Abuse Act; State Computer Crime Issues; ; Wireless Physical Layer Technologies; ISM Spectrum; Frequency Hopping Spread Spectrum (FHSS); Direct Sequence Spread Spectrum (DSSS); Orthogonal Frequency Division Multiplexing (OFDM); ; Wireless Management Frames; Beacon; Probe Request; Probe Response; Authentication; Association Request; Association Response; Disassociation and De-Authentication; CSMA/CA; Fragmentation; Distributed Coordination Function; Point
505 0 $aCoordination Function; Interframe Spacing; Service Set Identifier (SSID); ; Wireless Local and Personal Area Networks; Ad Hoc Mode; Infrastructure Mode; Bridging; Repeater; Mesh Wireless Networks; Local Area Networking Standards; Personal Area Network (PAN) 802.15; ; Wide Area Wireless Technologies; Cell Phone Technologies; GPS; 802.16 Air Interface Standard; 802.20 Standard; ; Wireless Antenna Theory; RF Antenna Overview; Fresnel Zone; Antenna Types; Connectors; ; The Wireless Deployment Process; Gather Requirements; Estimation; Make the Business Case; Site Survey; Design; Staging; Deployment and Installation; Certification; Audit; ; Wireless Access Points; Linksys Access Points; Cisco Access Points; ; Wireless End Devices; Laptops; Tablets; PDA Devices; Handheld Scanners; Smart Phones; Wi-Fi Phones; ; Wireless LAN Security; Wireless LAN Security
505 0 $aHistory; Authentication; SSID; Wireless Security Basics; Equivalent Privacy Standard (WEP); 802.1x; Remote Authentication Dial-In User Service (RADIUS); Extensible Authentication Protocol (EAP); Wi-Fi Protected Access (WPA); 802.11i; Wi-Fi Protected Access (WPA2); WLAN Authentication and Privacy Infrastructure (WAPI); Rogue Access Points Detection; ; Breaking Wireless Security; The Hacking Process; Wireless Network Compromising Techniques; Access Point Compromising Techniques; ; Wireless Security Policy; Policy Overview; The Policy-Writing Process; Risk Assessment; Impact Analysis; Wireless Security Policy Areas; ; Wireless Security Architectures; Static WEP Wireless Architecture; VPN; Wireless VPN Architecture Overview; VPN Policy Aspect; Wireless Gateway Systems; 802.1x; Comparing Wireless Security Architectures; ; Wireless Tools; Scanning Tools; Sniffing Tools; Hybrid Tools
505 0 $a; Denial-of-Service Tools; Cracking Tools; Access Point Attacking Tools; Other Wireless Security Tools; ; Appendix A: Review Question Answers
504 $aIncludes bibliographical references and index.
650 0 $aWireless LANs$xSecurity measures.
650 0 $aWireless communication systems$xSecurity measures.
650 6 $aRéseaux locaux sans fil$xSécurité$xMesures.
650 6 $aTransmission sans fil$xSécurité$xMesures.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aWireless communication systems$xSecurity measures.$2fast$0(OCoLC)fst01176222
650 7 $aWireless LANs$xSecurity measures.$2fast$0(OCoLC)fst01176207
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$aEarle, Aaron E.$tWireless security handbook.$dBoca Raton, FL : Auerbach, 2006$z0849333784$w(DLC) 2005049924$w(OCoLC)60651156
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15069040$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS