000 | 02558cam a2200397 i 4500 | ||
---|---|---|---|
001 | 13908578 | ||
003 | OSt | ||
005 | 20230527001544.0 | ||
008 | 050323s2005 njua b 001 0 eng d | ||
010 | _a 2005924619 | ||
020 |
_a9780764597305 _qpaperback |
||
020 |
_a0764597302 _qpaperback |
||
040 |
_aDLC _beng _cDLC _dDLC _dEG-CaTKH _erda |
||
042 | _apcc | ||
050 | 0 | 0 |
_aTK5105.78 _b.B43 2005 |
082 | 0 | 0 |
_a004.68 BE.H 2005 G.C _223 |
100 | 1 |
_aBeaver, Kevin, _eauthor. |
|
245 | 1 | 0 |
_aHacking wireless networks for dummies / _cby Kevin Beaver and Peter T. Davis ; foreword by Devin K. Akin. |
264 | 1 |
_aHoboken, NJ : _bWiley Pub. Inc., _c2005. |
|
300 |
_axviii, 362 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _b nc _2rdacarrier |
||
490 | 0 | _a--For dummies | |
504 | _aIncludes bibliographical references (pages 327-340) and index. | ||
505 | 0 | _aForeword -- Introduction -- Part I: Building the Foundation for Testing Wireless Networks -- Chapter 1: Introduction to Wireless Hacking -- Chapter 2: The Wireless Hacking Process -- Chapter 3: Implementing a Testing Methodology -- Chapter 4: Amassing Your War Chest. Part II: Getting Rolling with Common Wi-Fi Hacks -- Chapter 5: Human (In)Security -- Chapter 6: Containing the Airwaves -- Chapter 7: Hacking Wireless Clients -- Chapter 8: Discovering Default Settings -- Chapter 9: Wardriving -- Part III: Advanced Wi-Fi Hacks -- Chapter 10: Still at War -- Chapter 11: Unauthorized Wireless Devices -- Chapter 12: Network Attacks -- Chapter 13: Denial-of-Service Attacks -- Chapter 14: Cracking Encryption -- Chapter 15: Authenticating Users -- Part IV: The Part of Tens -- Chapter 16: Ten Essential Tools for Hacking Wireless Networks -- Chapter 17: Ten Wireless Security-Testing Mistakes -- Chapter 18: Ten Tips for Following Up after Your Testing -- Part V: Appendixes -- Appendix A: Wireless Hacking Resources -- Appendix B: Glossary of Acronyms -- Index. | |
520 | _aProvides information on wireless hacking, covering such topics as wardriving, denial-of-service attacks, encryption, and authenticating users. | ||
650 | 0 |
_aWireless LANs _vAmateurs' manuals. |
|
700 | 1 |
_aDavis, Peter T., _eauthor. |
|
830 | 0 | _a--For dummies | |
906 |
_a7 _bcbc _corignew _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
998 |
_ayomna.nassar _bP _d20221211 |
||
998 |
_amona.romia _bR _d20221211 |
||
999 |
_c672 _d672 |