Image from Google Jackets

Wi-Foo / Andrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky.

By: Contributor(s): Language: İngilizce Publisher: Boston, MA : Addison-Wesley, c2004Description: xxvii, 555 p. : ill. ; 24 cmISBN:
  • 0321202171
Other title:
  • Secrets of wireless hacking
Subject(s): LOC classification:
  • TK5105.59 .V63 2004
Online resources:
Contents:
CHAPTER 1 Real World Wireless Security -- CHAPTER 2 Under Siege -- CHAPTER 3 Putting the Gear Together: 802.11 Hardware -- CHAPTER 4 Making the Engine Run: 802.11 Drivers and Utilities -- CHAPTER 5 Learning to WarDrive: Network Mapping and Site Surveying -- CHAPTER 6 Assembling the Arsenal: Tools of the Trade -- CHAPTER 7 Planning the Attack -- CHAPTER 8 Breaking Through -- CHAPTER 9 Looting and Pillaging: The Enemy Inside -- CHAPTER 10 Building the Citadel: An Introduction to Wireless LAN Defense -- CHAPTER 11 Introduction to Applied Cryptography: Symmetric Ciphers -- CHAPTER 12 Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms -- CHAPTER 13 The Fortress Gates: User Authentication in Wireless Security -- CHAPTER 14 Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs -- CHAPTER 15 Counterintelligence: Wireless IDS Systems
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Vol info Copy number Status Date due Barcode
Book Book Merkez Kütüphane Genel Koleksiyon / Main Collection Merkez Kütüphane Genel Koleksiyon TK5105.59 .V63 2004 (Browse shelf(Opens below)) 1 1 Available 0032751

Includes index.

CHAPTER 1 Real World Wireless Security -- CHAPTER 2 Under Siege -- CHAPTER 3 Putting the Gear Together: 802.11 Hardware -- CHAPTER 4 Making the Engine Run: 802.11 Drivers and Utilities -- CHAPTER 5 Learning to WarDrive: Network Mapping and Site Surveying -- CHAPTER 6 Assembling the Arsenal: Tools of the Trade -- CHAPTER 7 Planning the Attack -- CHAPTER 8 Breaking Through -- CHAPTER 9 Looting and Pillaging: The Enemy Inside -- CHAPTER 10 Building the Citadel: An Introduction to Wireless LAN Defense -- CHAPTER 11 Introduction to Applied Cryptography: Symmetric Ciphers -- CHAPTER 12 Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms -- CHAPTER 13 The Fortress Gates: User Authentication in Wireless Security -- CHAPTER 14 Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs -- CHAPTER 15 Counterintelligence: Wireless IDS Systems

There are no comments on this title.

to post a comment.
Devinim Yazılım Eğitim Danışmanlık tarafından Koha'nın orjinal sürümü uyarlanarak geliştirilip kurulmuştur.