Seven Deadliest Wireless Technologies Attacks
Autor Brad Hainesen Limba Engleză Paperback – 14 mai 2010
Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.
This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.
Attacks detailed in this book include:
- 802.11 Wireless—Infrastructure Attacks
- 802.11 Wireless—Client Attacks
- Bluetooth Attacks
- RFID Attacks
- Analog Wireless Device Attacks
- Bad Encryption
- Attacks on Cell Phones, PDAs and Other Hybrid Devices
Preț: 105.95 lei
Preț vechi: 126.85 lei
-16% Nou
Puncte Express: 159
Preț estimativ în valută:
20.28€ • 21.06$ • 16.84£
20.28€ • 21.06$ • 16.84£
Carte tipărită la comandă
Livrare economică 27 ianuarie-10 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495417
ISBN-10: 1597495417
Pagini: 160
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 11 mm
Greutate: 0.35 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597495417
Pagini: 160
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 11 mm
Greutate: 0.35 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals of all levels; wireless device developers; recreational hackersCuprins
Introduction Chapter 1. 802.11 Wireless-Infrastructure Attacks Chapter 2. Wireless-Client Attacks Chapter 3. Bluetooth Attacks Chapter 4. Radio Frequency Identification Attacks Chapter 5. Analog Wireless Devices Chapter 6. Bad Encryption Chapter 7. Cell Phones, Personal Digital Assistants, and Other Hybrid Devices
Recenzii
"Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them."--Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London
"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples—they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010
"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples—they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010