Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Wireless Security

Buy
Maximum Wireless Security, 9780672324888 (0672324881), Que, 2002

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.

The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.

The first time we presented this subject was at the DallasCon Wireless Security Conference (www.dallascon.com). We were stunned by the response. The conference attendees included IT managers, network administrators, law enforcement, military officers, and hackers, from ages 18 to 63. The audience was enraptured by the wireless security talks, and most stayed for the entire 16 straight hours of lectures. Upon being surveyed, a staggering 98% of them said they would return to hear the exact same lectures again.

After the conference venue kicked us out at midnight, many followed us to a local coffee shop, where we continued teaching until close to dawn. Since that fateful night, the attendees (many of whom have since become close friends) have hounded us for any written material we could spare. This convinced us of the urgency for a printed reference on the subject.

This book is an answer to that urgency. This is the most practical guide to wireless security ever written, bar none. However, this book does not disparage any of the other excellent texts on the subject. In fact, the author of a competing wireless security book was kind enough to be our technical reviewer. Thus, we encourage other wireless security books as complementary. However, if you really want to learn how to war drive, then read this book first. If you do not audit your own wireless network very soon, then someone else will do it for you—with malicious intent.

Above all else, this is meant to be a "practical" book. Although there is plenty of theory in here for the hobbyist, the emphasis in this book is where the rubber meets the road. We start with theory, but quickly implement it using practical examples and real-world applications. After reading this book, you will know exactly how to lock down your wireless networks, step-by-step. Although the technical level is advanced, examples and case studies facilitate the material.

This book is targeted toward the security consultant, network administrator, IT manager, and "ethical" hacker. The text assumes basic experience with networking in either Windows or Linux. No prior wireless security experience is required. The level of material will appeal to the intermediate to expert practitioner.

(HTML tags aren't allowed.)

Biomechanics of Cells and Tissues: Experiments, Models and Simulations (Lecture Notes in Computational Vision and Biomechanics)
Biomechanics of Cells and Tissues: Experiments, Models and Simulations (Lecture Notes in Computational Vision and Biomechanics)

The application of methodological approaches and mathematical formalisms proper to Physics and Engineering to investigate and describe biological processes and design biological structures has led to the development of many disciplines in the context of computational biology and biotechnology. The best known applicative domain is tissue...

Above the Clouds: Managing Risk in the World of Cloud Computing
Above the Clouds: Managing Risk in the World of Cloud Computing

Interested in ways to make your business more efficient? Then Cloud Computing may be just what you have been looking for. Cloud Computing can enable you to drive down the costs of your IT function and gives you the ability to focus on your core business, whilst saving energy. The concept of shifting computing to a shared service provider is...

Introduction to Real Analysis (2nd Edition)
Introduction to Real Analysis (2nd Edition)

This text is a single variable real analysis text, designed for the one-year course at the junior, senior, or beginning graduate level. It provides a rigorous and comprehensive treatment of the theoretical concepts of analysis. The book contains most of the topics covered in a text of this nature, but it also includes many...


Service-Oriented Software System Engineering Challenges and Practices
Service-Oriented Software System Engineering Challenges and Practices
Current IT developments like component-based development and Web services have emerged as effective ways of building complex enterprise-scale information systems and providing enterprise application integration. To aid this process, platforms such as .NET and WebSphere have become standards in web-based systems development. However, there are still...
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)
Intelligent Open Learning Systems: Concepts, Models and Algorithms (Intelligent Systems Reference Library)

The book addresses the problem known in the literature as Open and Distance Learning (ODL). ODL describes new concepts of the process of learning-teaching organization. ODL is becoming very popular at universities that offer education via online and/or distance learning, both in synchronous or asynchronous modes. More precisely, the...

My Windows 10 (includes video and Content Update Program)
My Windows 10 (includes video and Content Update Program)

Book + 2 Hours of Free Video + Content Update Program


My Microsoft® Windows® 10 is an easy, full-color tutorial on the latest operating system from Microsoft. It includes 2 hours of FREE step-by-step video tutorials to help you learn how to navigate and
...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy