Hacking wireless networks for dummies / by Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin.
Material type: TextSeries: --For dummies | --For dummiesPublisher: Hoboken, NJ : Wiley Pub. Inc., 2005Description: xviii, 362 pages : illustrations ; 24 cmContent type:- text
- unmediated
- volume
- 9780764597305
- 0764597302
- 004.68 BE.H 2005 G.C 23
- TK5105.78 .B43 2005
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Books | The Knowledge Hub Library | Gift collections | 004.68 BE.H 2005 G.C (Browse shelf(Opens below)) | Available | 191610 |
Browsing The Knowledge Hub Library shelves, Collection: Gift collections Close shelf browser (Hides shelf browser)
No cover image available | ||||||||
003.54 RI.I 2007 G.C Introducing communication theory : | 004 CH.C 2009 G.C Coding and cryptology : second international workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009 : proceedings / | 004.0151 ST.D 2011 G.C Discrete mathematics for computer scientists / | 004.68 BE.H 2005 G.C Hacking wireless networks for dummies / | 005.1015113 HU.L 2004 G.C Logic in computer science : modelling and reasoning about systems / | 005.12 KR.P 2005 G.C Pattern-oriented software architecture / | 005.13 TA.S 2010 G.C Seven languages in seven weeks : a pragmatic guide to learning programming languages / |
Includes bibliographical references (pages 327-340) and index.
Foreword -- Introduction -- Part I: Building the Foundation for Testing Wireless Networks -- Chapter 1: Introduction to Wireless Hacking -- Chapter 2: The Wireless Hacking Process -- Chapter 3: Implementing a Testing Methodology -- Chapter 4: Amassing Your War Chest. Part II: Getting Rolling with Common Wi-Fi Hacks -- Chapter 5: Human (In)Security -- Chapter 6: Containing the Airwaves -- Chapter 7: Hacking Wireless Clients -- Chapter 8: Discovering Default Settings -- Chapter 9: Wardriving -- Part III: Advanced Wi-Fi Hacks -- Chapter 10: Still at War -- Chapter 11: Unauthorized Wireless Devices -- Chapter 12: Network Attacks -- Chapter 13: Denial-of-Service Attacks -- Chapter 14: Cracking Encryption -- Chapter 15: Authenticating Users -- Part IV: The Part of Tens -- Chapter 16: Ten Essential Tools for Hacking Wireless Networks -- Chapter 17: Ten Wireless Security-Testing Mistakes -- Chapter 18: Ten Tips for Following Up after Your Testing -- Part V: Appendixes -- Appendix A: Wireless Hacking Resources -- Appendix B: Glossary of Acronyms -- Index.
Provides information on wireless hacking, covering such topics as wardriving, denial-of-service attacks, encryption, and authenticating users.
There are no comments on this title.