Hacking exposed wireless wireless security secrets & solutions

"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools...

Full description

Main Author: Cache, Johnny
Other Authors: Liu, Vincent, Wright, Joshua
Language:English
Published: New York McGraw-Hill c2010
Subjects:
LEADER 01635cam a2200229 7i4500
001 0000033428
005 20131210090000.0
008 130424 eng
020 |a 9780071666619 (alk. paper) 
090 0 0 |a TK 5103.2 C23 2010 
100 1 |a Cache, Johnny 
245 1 0 |a Hacking exposed wireless  |b wireless security secrets & solutions  |c Johnny Cache, Joshua Wright, Vincent Liu 
260 |a New York  |b McGraw-Hill  |c c2010 
300 |a xxv, 484 p.  |b ill.  |c 24 cm 
504 |a Includes bibliographical references and index 
520 |a "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]  
650 0 |a Wireless communication systems  |x Security measures 
650 0 |a Wireless LANs  |x Security measures 
700 1 |a Liu, Vincent 
700 1 |a Wright, Joshua 
999 |a 18777 
999 |a 18777  |b Book  |c General Collection  |e JKR Library