000 | 03282cam a2200481 i 4500 | ||
---|---|---|---|
005 | 20230825092505.0 | ||
008 | 100901s2010 nyua b 001 0 eng d | ||
010 | _a 2010027293 | ||
011 | _aATTENTION: Field 082 : DDC value 005.8 clashes with held titles : [BIB: 1273000 Hacking exposed wireless / Cache, Johnny.(McGraw-Hill, 2007.) - DDC: 621.382]. | ||
011 | _aBIB MATCHES WORLDCAT | ||
020 |
_a0071666613 _qalk. paper |
||
020 |
_a9780071666619 _qalk. paper |
||
035 | _a(ATU)b11743049 | ||
035 | _a(OCoLC)640078077 | ||
040 |
_aDLC _beng _erda _cDLC _dBTCTA _dYDXCP _dUKM _dC#P _dBWX _dEINCP _dATU |
||
050 | 0 | 0 |
_aTK5103.2 _b.C23 2010 |
082 | 0 | 0 |
_a621.382 _222 |
100 | 1 |
_aCache, Johnny, _eauthor. _91080603 |
|
245 | 1 | 0 |
_aHacking exposed wireless : _bwireless security secrets & solutions / _cJohnny Cache, Joshua Wright, Vincent Liu. |
246 | 3 | 0 | _aWireless |
250 | _aSecond edition. | ||
264 | 1 |
_aNew York : _bMcGraw-Hill, _c[2010] |
|
264 | 4 | _c©2010 | |
300 |
_axxv, 484 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
490 | 1 | _aHacking exposed | |
500 | _aA companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com . | ||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aPART I: HACK 802.11 WIRELESS TECHNOLOGY 1 Introduction to 802.11 Hacking ; 2 Scanning and Enumerating 802.11 Networks ; 3 Attacking 802.11 Wireless Networks ; 4 Attacking WPA-protected 802.11 Networks PART II: HACK 802.11 CLIENTS 5 Attack 802.11 Wireless Clients ; 6 Taking it All the Way: Bridging the Airgap from OS X ; 7 Taking it All the Way: Bridge the Airgap from Windows PART III: HACK ADDITIONAL WIRELESS TECHNOLOGIES 8 Bluetooth Scanning and Reconnaissance ; 9 Bluetooth Eavesdropping ; 10 Attacking and Exploiting Bluetooth ; 11 Hack Zigbee ; 12 Hack DECT. | |
520 | _a"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systms, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4] | ||
588 | _aMachine converted from AACR2 source record. | ||
650 | 0 |
_aWireless communication systems _xSecurity measures _9812076 |
|
650 | 0 |
_aWireless LANs _xSecurity measures _9812055 |
|
700 | 1 |
_aWright, Joshua, _eauthor. _91080604 |
|
700 | 1 |
_aLiu, Vincent, _eauthor. _91080605 |
|
830 | 0 | _aHacking exposed. | |
907 |
_a.b11743049 _b11-07-17 _c27-10-15 |
||
942 | _cB | ||
945 |
_a621.382 CAC _g1 _iA454660B _j0 _lcmain _o- _p$74.75 _q- _r- _s- _t0 _u5 _v0 _w0 _x1 _y.i13050588 _z29-10-15 |
||
998 |
_ab _ac _b06-04-16 _cm _da _feng _gnyu _h0 |
||
999 |
_c1211521 _d1211521 |