000 03282cam a2200481 i 4500
005 20230825092505.0
008 100901s2010 nyua b 001 0 eng d
010 _a 2010027293
011 _aATTENTION: Field 082 : DDC value 005.8 clashes with held titles : [BIB: 1273000 Hacking exposed wireless / Cache, Johnny.(McGraw-Hill, 2007.) - DDC: 621.382].
011 _aBIB MATCHES WORLDCAT
020 _a0071666613
_qalk. paper
020 _a9780071666619
_qalk. paper
035 _a(ATU)b11743049
035 _a(OCoLC)640078077
040 _aDLC
_beng
_erda
_cDLC
_dBTCTA
_dYDXCP
_dUKM
_dC#P
_dBWX
_dEINCP
_dATU
050 0 0 _aTK5103.2
_b.C23 2010
082 0 0 _a621.382
_222
100 1 _aCache, Johnny,
_eauthor.
_91080603
245 1 0 _aHacking exposed wireless :
_bwireless security secrets & solutions /
_cJohnny Cache, Joshua Wright, Vincent Liu.
246 3 0 _aWireless
250 _aSecond edition.
264 1 _aNew York :
_bMcGraw-Hill,
_c[2010]
264 4 _c©2010
300 _axxv, 484 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
490 1 _aHacking exposed
500 _aA companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .
504 _aIncludes bibliographical references and index.
505 0 _aPART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT.
520 _a"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
588 _aMachine converted from AACR2 source record.
650 0 _aWireless communication systems
_xSecurity measures
_9812076
650 0 _aWireless LANs
_xSecurity measures
_9812055
700 1 _aWright, Joshua,
_eauthor.
_91080604
700 1 _aLiu, Vincent,
_eauthor.
_91080605
830 0 _aHacking exposed.
907 _a.b11743049
_b11-07-17
_c27-10-15
942 _cB
945 _a621.382 CAC
_g1
_iA454660B
_j0
_lcmain
_o-
_p$74.75
_q-
_r-
_s-
_t0
_u5
_v0
_w0
_x1
_y.i13050588
_z29-10-15
998 _ab
_ac
_b06-04-16
_cm
_da
_feng
_gnyu
_h0
999 _c1211521
_d1211521