did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780072262582

Wireless : Wireless Security Secrets and Solutions

by
  • ISBN13:

    9780072262582

  • ISBN10:

    0072262583

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2007-03-26
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $12.50
  • Digital
    $49.99
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys

Author Biography

John Bock (Los Angeles, CA) is a Director at C-Level Security, LLC where he is responsible for the development and management of C-Level Security vulnerability assessment services. Prior to working at C-Level SecurityJohn was a Principal Consultant with Foundstone where he performed wireless vulnerability assessments and developed the Foundstone 802.11 assessment methodology. John also served as a R&D engineer while at Foundstone, where he developed wireless device detection capabilities for the award winning Foundstone Enterprise vulnerability management system as well as conducted wireless assessment training to the Foundstone consulting group. Before joining Foundstone he performed penetration testing, security assessments and spoke about wireless security as a consultant for Internet Security Systems (ISS). Prior to ISS he was a network security analyst/UNIX systems administrator at marchFIRST where he was responsible for maintaining security on a 7000 user global network. John has also been a contributing author or technical editor for major publications, including Hacking Exposed 4th Ed, Hacking Exposed Windows 2003 Server, HackNotes Network Security, Network Security: A Beginners Guide, and Special Ops Security.

Michael Lynn (Atlanta, GA) is a pioneering researcher in the field of wireless network security. He is the creator of the first commercial wireless intrusion detection system, and a founder of AirDefense Inc. Michael has authored a variety of 802.11 related security tools including the Airjack security testing suite, and discovered multiple 802.11 vulnerabilities through his research. As a conference speaker Micheal has given talks at Blackhat and Defcon on the topic of advanced 802.11 attacks. Mr. Lynn is currently a member of the X-Force advanced security research team for Internet Security Systems.

Table of Contents

Part I: 802.11 Wireless Technology

Chapter 1: Hacking 802.11

Chapter 2: Discover and Verify

Chapter 3: Capture and Analyze

Chapter 4: Basic Attacks

Chapter 5: Decryption Attacks

Chapter 6: Authentication Attacks

Chapter 7: Man-In-The-Middle attacks

Chapter 8: VPN Attacks

Chapter 9: Denial of Service

Chapter 10: 802.11 Intrusion Detection and Prevention

Chapter 11: 802.11 Defenses

Chapter 12: Other 802.11 related attacks

Part II: Other Wireless Technologies

Chapter 13: Hacking Bluetooth

Chapter 14: 3G Wireless Services

Chapter 15: Text Service Interception

Chapter 16: Scanners and RF Monitoring

Chapter 17: IRDA

Chapter 18: RFID

Chapter 19: Emerging Technologies

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program