Seven deadliest wireless technologies attacks / Brad Haines ; technical editor, Tim Kramer.
نوع المادة : نصالسلاسل:Syngress seven deadliest attacks seriesالناشر:Amersterdam ; Boston : Syngress/Elsevier, [2010]تاريخ حقوق النشر: copyright 2010وصف:xvi, 122 pages : illustrations, map ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9781597495417 (pbk)
- 7 deadliest wireless technologies attacks
- TK5103.2 H325 2010
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5103.2 H325 2010 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000146327 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5103.2 H325 2010 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000146326 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5103.2 .G744 2018 Green energy and networking : 5th EAI International Conference, GreeNets 2018, Guimarães, Portugal, November 21-23, 2018, Proceedings / | TK5103.2 .G744 2018 Green energy and networking : 5th EAI International Conference, GreeNets 2018, Guimarães, Portugal, November 21-23, 2018, Proceedings / | TK5103.2 .G744 2019 Green energy and networking : 6th EAI International Conference, GreeNets 2019, Dalian, China, May 4, 2019, proceedings / | TK5103.2 H325 2010 Seven deadliest wireless technologies attacks / | TK5103.2 H325 2010 Seven deadliest wireless technologies attacks / | TK5103.2 H39 2005 Modern wireless communications / | TK5103.2 H39 2005 Modern wireless communications / |
Includes bibliographical references and index.
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell phones, personal digital assistants, and other hybrid devices.
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: 1.802.11 Wireless-Infrastructure Attacks 2.802.11 Wireless-Client Attacks 3.Bluetooth Attacks 4.RFID Attacks 5.Analog Wireless Device Attacks 6.Bad Encryption 7.Attacks on Cell Phones, PDAs and Other Hybrid Devices