Hacking Exposed Wireless, Second Edition Wireless Security Secrets and Solutions

by ; ;
Edition: 2nd
Format: Paperback
Pub. Date: 2010-07-09
Publisher(s): McGraw-Hill Osborne Media
List Price: $55.00

Buy New

Usually Ships in 8 - 10 Business Days.
$54.95

Rent Book

Select for Price
There was a problem. Please try again later.

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

The latest techniques for securing wireless networks using the proven the Hacking Exposed methodologyFilled with tactical security information,Hacking Exposed Wireless, Second Editionsheds light on how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. The book includes vital details on new, previously unpublished attacks alongside real-world, proven countermeasures. Seven new chapters discuss in depth how to conduct an assessment from start to finish, secure Bluetooth networks, write custom wireless security tools, and ensure compliance with the latest wireless laws and regulations.Hacking Exposed Wireless, Second Editionfeatures: Thorough updates for the latest wireless threats and techniques Information on wireless laws and regulations including how to meet PCI wireless security requirements Content written by world-renowned wireless security experts Global examples throughoutComprehensive coverage of wireless network security: Wireless Fundamentals; An Overview of Wireless Security; Radio Frequency Fundamentals; Introduction to 802.11; Hacking 802.11 Wireless Networks; Building Your Wireless Hacking Toolkits; Scoping and Information Gathering; Discovering Wireless Targets; Scanning and Enumeration of 802.11 Networks; Attacking 802.11 Wireless Networks; Attacking WPA-protected 802.11 Networks; Attacking 802.11 Wireless Clients; Defending Your Wireless Network; Hacking Additional Wireless Technologies; Hacking Hotspots; Bluetooth Basics; Attacking Bluetooth Security; Other Wireless Protocols; Writing Your Own Wireless Security Tools; Wireless Hacking Laws and Regulations

Author Biography

Johnny Cache, the author of many wireless tools, has spoken at several security conferences including BlackHat, BlueHat, and ToorCon. Vincent Liu, CISSP (Mesa, AZ) is the Managing Director at Stach & Liu, a security consulting firm providing services to the Fortune 500 and global financial institutions as well as U.S. and foreign governments. Previously, he led the Attack & Penetration and Reverse Engineering teams for the Global Security unit at Honeywell International.

Table of Contents

Part I: Hack 802.11 Wireless Technology
1 Introduction to 802.11 Hacking
2 Scanning and Enumerating 802.11 Networks
3 Attacking 802.11 Wireless Networks
4 Attacking WPA-protected 802.11 Networks
Part II: Hack 802.11 Clients
5 Attack 802.11 Wireless Clients
6 Taking it All the Way: Bridging the Airgap from OS X
7 Taking it All the Way: Bridge the Airgap from Windows
Part III: Hack Additional Wireless Technologies
8 Bluetooth Scanning and Reconnaissance
9 Bluetooth Eavesdropping
10 Attacking and Exploiting Bluetooth
11 Hack Zigbee
12 Hack DECT
Appendix A: Scoping and Information Gathering

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.