Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Wireless

Buy
Hacking Exposed Wireless, 9780072262582 (0072262583), McGraw-Hill, 2007

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures.

  • Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth
  • Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks
  • Defend against WEP key brute-force, aircrack, and traffic injection hacks
  • Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles
  • Prevent rogue AP and certificate authentication attacks
  • Perform packet injection from Linux
  • Launch DoS attacks using device driver-independent tools
  • Exploit wireless device drivers using the Metasploit 3.0 Framework
  • Identify and avoid malicious hotspots
  • Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

About the Authors

Johnny Cache received his Masters in Computer Science from the Naval Postgraduate School in 2006. His thesis work, which focused on fingerprinting 802.11 device drivers, won the Gary Kildall award for the most innovative computer science thesis. Johnny wrote his first program on a Tandy 128K color computer sometime in 1988. Since then, he has spoken at several security conferences including BlackHat, BlueHat, and toorcon. He has also released a number of papers related to 802.11 security and is the author of many wireless tools. Most of his wireless utilities are included in the Airbase suite, available at 802.11mercenary.net.

Vincent Liu, CISSP, is the Managing Director at Stach & Liu, a professional services firm providing IT security consulting to the Fortune 500, national law firms, and global financial institutions. Before founding Stach & Liu, Vincent led the Attack & Penetration and Reverse Engineering teams for the Global Security unit at Honeywell International. Prior to that, he was a consultant with the Ernst & Young Advanced Security Centers and an analyst at the National Security Agency. Vincent is a developer for the Metasploit Project and an experienced speaker, having presented his research at conferences including BlackHat, toorcon, and Microsoft BlueHat. Vincent has been published in interviews, journals, and books with highlights including Penetration Tester's Open Source Toolkit, Writing Security Tools and Exploits, Sockets, and Shellcode, Porting, and Coding. Vincent holds a Bachelor of Science and Engineering from the University of Pennsylvania with a major in computer science and engineering and a minor in psychology.

(HTML tags aren't allowed.)

Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks
Building Web Applications with Visual Studio 2017: Using .NET Core and Modern JavaScript Frameworks

Learn how to build web applications from three Microsoft MVPs. After building the data application layer using Entity Framework Core and a RESTful service using ASP.NET Core, you will then build the client side web application three ways: first, using ASP.NET Core, then using Angular 2, and, finally, using React.  You will be...

Reason 2.5 Ignite! (Power Start)
Reason 2.5 Ignite! (Power Start)

Are you ready to create musical masterpieces with Reason 2.5? If you've always wanted to try Reason but didn't know where to begin, "Reason 2.5 Ignite!" will walk you through its creative possibilities. Through a multitude of examples and clear illustrations, you'll cover the main features and functions of Reason....

Handbook of Chemoinformatics Algorithms (Chapman & Hall/CRC Mathematical and Computational Biology)
Handbook of Chemoinformatics Algorithms (Chapman & Hall/CRC Mathematical and Computational Biology)

Unlike in the related area of bioinformatics, few books currently exist that document the techniques, tools, and algorithms of chemoinformatics. Bringing together worldwide experts in the field, the Handbook of Chemoinformatics Algorithms provides an overview of the most common chemoinformatics algorithms in a single...


Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)
Optimization and Data Analysis in Biomedical Informatics (Fields Institute Communications)

​This volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled ‘Optimization and Data Analysis in Biomedical Informatics’ was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks...

Glaucoma Surgery (Book & DVD)
Glaucoma Surgery (Book & DVD)
Why a new Glaucoma surgery text at this time? A review of currently available texts reveals a paucity of readily available information for the Glaucoma Specialist. Although there are some excellent surgical texts for general ophthalmologists, there are few indepth texts available to help the Glaucoma specialist deal with...
Objective-C Programming For Dummies
Objective-C Programming For Dummies

A step-by-step guide to understanding object-oriented programming with Objective-C

As the primary programming language for iPhone, iPad, and Mac OS X applications, Objective-C is a reflective, object-oriented language that all programmers must know before creating apps. Assuming no prior programming language experience, this...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy