Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Maximum Wireless Security

Buy
Maximum Wireless Security, 9780672324888 (0672324881), Que, 2002

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.

The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.

The first time we presented this subject was at the DallasCon Wireless Security Conference (www.dallascon.com). We were stunned by the response. The conference attendees included IT managers, network administrators, law enforcement, military officers, and hackers, from ages 18 to 63. The audience was enraptured by the wireless security talks, and most stayed for the entire 16 straight hours of lectures. Upon being surveyed, a staggering 98% of them said they would return to hear the exact same lectures again.

After the conference venue kicked us out at midnight, many followed us to a local coffee shop, where we continued teaching until close to dawn. Since that fateful night, the attendees (many of whom have since become close friends) have hounded us for any written material we could spare. This convinced us of the urgency for a printed reference on the subject.

This book is an answer to that urgency. This is the most practical guide to wireless security ever written, bar none. However, this book does not disparage any of the other excellent texts on the subject. In fact, the author of a competing wireless security book was kind enough to be our technical reviewer. Thus, we encourage other wireless security books as complementary. However, if you really want to learn how to war drive, then read this book first. If you do not audit your own wireless network very soon, then someone else will do it for you—with malicious intent.

Above all else, this is meant to be a "practical" book. Although there is plenty of theory in here for the hobbyist, the emphasis in this book is where the rubber meets the road. We start with theory, but quickly implement it using practical examples and real-world applications. After reading this book, you will know exactly how to lock down your wireless networks, step-by-step. Although the technical level is advanced, examples and case studies facilitate the material.

This book is targeted toward the security consultant, network administrator, IT manager, and "ethical" hacker. The text assumes basic experience with networking in either Windows or Linux. No prior wireless security experience is required. The level of material will appeal to the intermediate to expert practitioner.

(HTML tags aren't allowed.)

IPv6 in Practice: A Unixer's Guide to the Next Generation Internet
IPv6 in Practice: A Unixer's Guide to the Next Generation Internet

Handling IPv6 for the first time is a challenging task even for the experienced system administrator. New concepts and mechanisms make it necessary to rethink well-established methods of the IPv4 protocol.

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily...

BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)

By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....

All-Digital Frequency Synthesizer in Deep-Submicron CMOS
All-Digital Frequency Synthesizer in Deep-Submicron CMOS

Design flow and circuit techniques of contemporary transceivers for multigigahertz mobile radio-frequency (RF) wireless applications are typically quite analog intensive and utilize process technologies that are incompatible with a digital baseband (DBB) and application processor (AP). Nowadays, the DBB and AP designs constantly migrate to...


Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)

Eclipse is an open source universal tool platform, dedicated to providing a robust, full-featured industry platform for the development of highly integrated tools. With millions of downloads, Eclipse becomes more and more popular. One of the most important common facilities provided by the Eclipse framework is the portable...

SoapUI Cookbook
SoapUI Cookbook

Boost your SoapUI capabilities to test RESTful and SOAP APIs with over 65 hands-on recipes

About This Book

  • Quickly gain simple-to-use building blocks to power up your SoapUI toolkit
  • Use Groovy scripting and open source technologies to add the SoapUI functionality you need to successfully...
Advertising Secrets of the Written Word: The Ultimate Resource on How to Write Powerful Advertising Copy from One of America's Top Copywriters and Mail Order Entrepreneurs
Advertising Secrets of the Written Word: The Ultimate Resource on How to Write Powerful Advertising Copy from One of America's Top Copywriters and Mail Order Entrepreneurs
Every trade has its role models. And for me, there is no better model for ad copywriters or maazine editors... -- Ray Schultz, Editor, DIRECT Magazine

I have been a fan of Joseph Sugarman's copywriting and marketing ideas for years and have benefited greatly... -- Jack Canfield, Co-author, Chicken Soup for the Soul
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy