Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Wireless Security

Buy
Maximum Wireless Security, 9780672324888 (0672324881), Que, 2002

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.

The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.

The first time we presented this subject was at the DallasCon Wireless Security Conference (www.dallascon.com). We were stunned by the response. The conference attendees included IT managers, network administrators, law enforcement, military officers, and hackers, from ages 18 to 63. The audience was enraptured by the wireless security talks, and most stayed for the entire 16 straight hours of lectures. Upon being surveyed, a staggering 98% of them said they would return to hear the exact same lectures again.

After the conference venue kicked us out at midnight, many followed us to a local coffee shop, where we continued teaching until close to dawn. Since that fateful night, the attendees (many of whom have since become close friends) have hounded us for any written material we could spare. This convinced us of the urgency for a printed reference on the subject.

This book is an answer to that urgency. This is the most practical guide to wireless security ever written, bar none. However, this book does not disparage any of the other excellent texts on the subject. In fact, the author of a competing wireless security book was kind enough to be our technical reviewer. Thus, we encourage other wireless security books as complementary. However, if you really want to learn how to war drive, then read this book first. If you do not audit your own wireless network very soon, then someone else will do it for you—with malicious intent.

Above all else, this is meant to be a "practical" book. Although there is plenty of theory in here for the hobbyist, the emphasis in this book is where the rubber meets the road. We start with theory, but quickly implement it using practical examples and real-world applications. After reading this book, you will know exactly how to lock down your wireless networks, step-by-step. Although the technical level is advanced, examples and case studies facilitate the material.

This book is targeted toward the security consultant, network administrator, IT manager, and "ethical" hacker. The text assumes basic experience with networking in either Windows or Linux. No prior wireless security experience is required. The level of material will appeal to the intermediate to expert practitioner.

(HTML tags aren't allowed.)

Communicating Mathematics in the Digital Era
Communicating Mathematics in the Digital Era

The digital era has dramatically changed the ways that researchers search, produce, publish, and disseminate their scientific work. These processes are still rapidly evolving due to improvements in information science, new achievements in computer science technologies, and initiatives such as DML and open access journals, digitization...

Visual Basic 2008 Recipes: A Problem-Solution Approach
Visual Basic 2008 Recipes: A Problem-Solution Approach
Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium of practical solutions for busy VB .NET programmers. Create time for the more interesting aspects of your VB .NET project by solving common problems with the practical solutions and dozens of code examples in this...
Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning
Machine Learning with Python Cookbook: Practical Solutions from Preprocessing to Deep Learning

This practical guide provides nearly 200 self-contained recipes to help you solve machine learning challenges you may encounter in your daily work. If you’re comfortable with Python and its libraries, including pandas and scikit-learn, you’ll be able to address specific problems such as loading data, handling text or...


Business Data Communications and Networking
Business Data Communications and Networking
Over the past few years, many fundamental changes have occurred in data communications and networking that will shape the future for decades to come. Networking applications such as the Internet and World Wide Web have exploded into the business world. High-speed modems providing megabit data rates (millions of bits per second)...
Learning Python Application Development
Learning Python Application Development

Key Features

  • Get to grips with Python techniques that address commonly encountered problems in general application development.
  • Develop, package, and deploy efficient applications in a fun way.
  • All-practical coverage of the major areas of application development, including best practices,...
Real-Resumes for Computer Jobs (Real-Resumes Series)
Real-Resumes for Computer Jobs (Real-Resumes Series)
Every resume and cover letter in this book actually worked. And most of the resumes and cover letters have common features: all are one-page, all are in the chronological format, and all resumes are accompanied by a companion cover letter. The book is divided into three parts. Part One provides some advice about job hunting. Step...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy