Staff View for: Seven deadliest wireless technologies at

 Staff view

You must be logged in to Tag Records

Seven deadliest wireless technologies attacks [electronic resource] /

Brad Haines ; technical editor, Tim Kramer.

Book Cover
Main Author: Haines, Brad.
Published: Burlington, MA : Syngress/Elsevier, c2010.
Series: Syngress seven deadliest attacks series.
Topics: Wireless communication systems - Security measures. | Computer networks - Security measures. | Computer security. | Réseaux d'ordinateurs. | Transmission sans fil. | Wireless communication systems / Security measures. | Computer networks / Security measures. | Computer security.
Genres: Electronic books. | Electronic books.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

000 03661cam a2200529Ia 4500
001 11750342
005 20150717233525.0
006 m o d
007 cr cn|||||||||
008 100513s2010 mauab ob 001 0 eng d
019 |a688587526|a793291784
020 |a9781597495417
020 |a1597495417
035 |a(OCoLC)ocn613958928
035 |a(UISdb)672675
037 |a1094073:10885961|bElsevier Science & Technology|n
049 |aIASB
050 4|aTK5103.2|b.H325 2010
082 04|a005.8|222
100 1 |aHaines, Brad.
245 10|aSeven deadliest wireless technologies attacks|h[electronic resource] /|cBrad Haines ; technical editor, Tim Kramer.
260 |aBurlington, MA :|bSyngress/Elsevier,|cc2010.
300 |a1 online resource (xvi, 122 p.) :|bill.
490 1 |aSyngress seven deadliest attacks series
504 |aIncludes bibliographical references and index.
505 0 |aIntroduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
505 0 |a802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.
520 |aHow can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
588 |aDescription based on print version record.
650 0|aWireless communication systems|xSecurity measures.
650 0|aComputer networks|xSecurity measures.
650 0|aComputer security.
650 6|aRéseaux d'ordinateurs.
650 6|aTransmission sans fil.
650 7|aWireless communication systems / Security measures.|2local
650 7|aComputer networks / Security measures.|2local
650 7|aComputer security.|2local
655 4|aElectronic books.
655 0|aElectronic books.
776 08|iPrint version:|aHaines, Brad.|tSeven deadliest wireless technologies attacks.|dBurlington, MA : Syngress/Elsevier, c2010|z9781597495417|z1597495417|w(DLC) 2010014460|w(OCoLC)609304010
830 0|aSyngress seven deadliest attacks series.
852 0 |bEbook|hTK5103.2|i.H325 2010|t1
856 40|u
938 |aCoutts Information Services|bCOUT|n14948503
938 |aBooks 24x7|bB247|nbks00036369
994 |a92|bIAS

Staff View for: Seven deadliest wireless technologies at