"Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them." — Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples-they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes." — Help Net Security, October 04, 2010
Content: Copyright, Page iv Acknowledgments, Page ix About the Authors, Page xi Introduction, Pages xiii-xvi CHAPTER 1 - 802.11 Wireless – Infrastructure Attacks, Pages 1-24 CHAPTER 2 - Wireless – Client Attacks, Pages 25-41 CHAPTER 3 - Bluetooth Attacks, Pages 43-55 CHAPTER 4 - Radio Frequency Identification Attacks, Pages 57-73 CHAPTER 5 - Analog Wireless Devices, Pages 75-87 CHAPTER 6 - Bad Encryption, Pages 89-102 CHAPTER 7 - Cell Phones, Personal Digital Assistants, and Other Hybrid Devices, Pages 103-119 Index, Pages 121-122