000 02105 a2200385 4500
001 77978
999 _c77978
_d25163
003 TR-AnTOB
005 20200402153424.0
008 160701s2004 maua 001 0 d
010 _a2004105900
020 _a0321202171
040 _aVYR
_aTR-AnTOB
_cVYR
_dUAT
_dDLC
041 _aeng
050 0 0 _aTK5105.59
_b.V63 2004
090 _aTK5105.59 .V63 2004
100 _aVladimirov, Andrew A.
_963413
245 0 _aWi-Foo /
_cAndrew A. Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky.
246 0 3 _aSecrets of wireless hacking
264 1 _aBoston, MA :
_bAddison-Wesley,
_cc2004.
300 _axxvii, 555 p. :
_bill. ;
_c24 cm.
500 _aIncludes index.
505 _aCHAPTER 1 Real World Wireless Security -- CHAPTER 2 Under Siege -- CHAPTER 3 Putting the Gear Together: 802.11 Hardware -- CHAPTER 4 Making the Engine Run: 802.11 Drivers and Utilities -- CHAPTER 5 Learning to WarDrive: Network Mapping and Site Surveying -- CHAPTER 6 Assembling the Arsenal: Tools of the Trade -- CHAPTER 7 Planning the Attack -- CHAPTER 8 Breaking Through -- CHAPTER 9 Looting and Pillaging: The Enemy Inside -- CHAPTER 10 Building the Citadel: An Introduction to Wireless LAN Defense -- CHAPTER 11 Introduction to Applied Cryptography: Symmetric Ciphers -- CHAPTER 12 Cryptographic Data Integrity Protection, Key Exchange, and User Authentication Mechanisms -- CHAPTER 13 The Fortress Gates: User Authentication in Wireless Security -- CHAPTER 14 Guarding the Airwaves: Deploying Higher-Layer Wireless VPNs -- CHAPTER 15 Counterintelligence: Wireless IDS Systems
650 _aKablosuz iletişim sistemleri
_91073
650 _aWireless communication systems
_9692
650 _aComputer networks
_xSecurity measures
_947
650 _aBilgisayar ağları
_xGüvenlik önlemleri
_921519
700 _aMikhailovsky, Andrei A.
_963414
700 _aGavrilenko, Konstantin V.
_963415
856 0 _uhttp://www.loc.gov/catdir/toc/fy0606/2004105900.html
_3Table of contents
902 _a0032751
903 _aMerkez Kütüphane
945 _aCT
942 _cBK