did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071666619

Hacking Exposed Wireless, Second Edition Wireless Security Secrets and Solutions

by ; ;
  • ISBN13:

    9780071666619

  • ISBN10:

    0071666613

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2010-07-09
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition
  • Purchase Benefits
List Price: $55.00 Save up to $1.65
  • Buy New
    $53.35
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

The latest techniques for securing wireless networks using the proven the Hacking Exposed methodologyFilled with tactical security information,Hacking Exposed Wireless, Second Editionsheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. The book includes vital details on new, previously unpublished attacks alongside real-world, proven countermeasures. Seven new chapters discuss in depth how to conduct an assessment from start to finish, secure Bluetooth networks, write custom wireless security tools, and ensure compliance with the latest wireless laws and regulations.Hacking Exposed Wireless, Second Editionfeatures: Thorough updates for the latest wireless threats and techniques Information on wireless laws and regulations including how to meet PCI wireless security requirements Content written by world-renowned wireless security experts Global examples throughoutComprehensive coverage of wireless network security: Wireless Fundamentals; An Overview of Wireless Security; Radio Frequency Fundamentals; Introduction to 802.11; Hacking 802.11 Wireless Networks; Building Your Wireless Hacking Toolkits; Scoping and Information Gathering; Discovering Wireless Targets; Scanning and Enumeration of 802.11 Networks; Attacking 802.11 Wireless Networks; Attacking WPA-protected 802.11 Networks; Attacking 802.11 Wireless Clients; Defending Your Wireless Network; Hacking Additional Wireless Technologies; Hacking Hotspots; Bluetooth Basics; Attacking Bluetooth Security; Other Wireless Protocols; Writing Your Own Wireless Security Tools; Wireless Hacking Laws and Regulations

Author Biography

Johnny Cache, the author of many wireless tools, has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. Vincent Liu, CISSP (Mesa, AZ) is the Managing Director at Stach & Liu, a security consulting firm providing services to the Fortune 500 and global financial institutions as well as U.S. and foreign governments. Previously, he led the Attack & Penetration and Reverse Engineering teams for the Global Security unit at Honeywell International.

Table of Contents

Part I: Hack 802.11 Wireless Technology
1 Introduction to 802.11 Hacking
2 Scanning and Enumerating 802.11 Networks
3 Attacking 802.11 Wireless Networks
4 Attacking WPA-protected 802.11 Networks
Part II: Hack 802.11 Clients
5 Attack 802.11 Wireless Clients
6 Taking it All the Way: Bridging the Airgap from OS X
7 Taking it All the Way: Bridge the Airgap from Windows
Part III: Hack Additional Wireless Technologies
8 Bluetooth Scanning and Reconnaissance
9 Bluetooth Eavesdropping
10 Attacking and Exploiting Bluetooth
11 Hack Zigbee
12 Hack DECT
Appendix A: Scoping and Information Gathering

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program