Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Haines B. — Seven Deadliest Wireless Technologies Attacks
Haines B. — Seven Deadliest Wireless Technologies Attacks

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Seven Deadliest Wireless Technologies Attacks

Автор: Haines B.

Аннотация:

  • "Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them." — Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London

    "I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples-they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes." — Help Net Security, October 04, 2010


Content:
Copyright, Page iv
Acknowledgments, Page ix
About the Authors, Page xi
Introduction, Pages xiii-xvi
CHAPTER 1 - 802.11 Wireless – Infrastructure Attacks, Pages 1-24
CHAPTER 2 - Wireless – Client Attacks, Pages 25-41
CHAPTER 3 - Bluetooth Attacks, Pages 43-55
CHAPTER 4 - Radio Frequency Identification Attacks, Pages 57-73
CHAPTER 5 - Analog Wireless Devices, Pages 75-87
CHAPTER 6 - Bad Encryption, Pages 89-102
CHAPTER 7 - Cell Phones, Personal Digital Assistants, and Other Hybrid Devices, Pages 103-119
Index, Pages 121-122


Язык: en

Рубрика: Разное/

Статус предметного указателя: Неизвестно

ed2k: ed2k stats

Год издания: 2010

Количество страниц: 124

Добавлена в каталог: 01.10.2017

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2018
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте