|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_ocn763159118 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
111014s2011 enka o 001 0 eng d |
040 |
|
|
|a E7B
|b eng
|e pn
|c E7B
|d OCLCQ
|d YDXCP
|d N$T
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d KNOVL
|d OCLCQ
|d LOA
|d JBG
|d AGLDB
|d ICA
|d CNNOR
|d Z5A
|d MOR
|d PIFAG
|d OCLCQ
|d U3W
|d D6H
|d OCLCF
|d STF
|d WRM
|d BRL
|d VTS
|d INT
|d OCLCQ
|d A6Q
|d UKAHL
|d VT2
|d UKCRE
|d VLY
|d AJS
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 961610329
|a 962610154
|a 965998306
|a 988531994
|a 992014500
|a 1037758209
|a 1038568565
|a 1039416560
|a 1083554632
|a 1103250099
|a 1129360155
|a 1153499199
|a 1162039326
|a 1241910808
|a 1290082674
|a 1300551274
|
020 |
|
|
|a 9781849515597
|q (electronic bk.)
|
020 |
|
|
|a 184951559X
|q (electronic bk.)
|
020 |
|
|
|a 9781849515580
|q (electronic bk.)
|
020 |
|
|
|a 1849515581
|q (electronic bk.)
|
020 |
|
|
|a 9781621989004
|q (electronic bk.)
|
020 |
|
|
|a 1621989003
|q (electronic bk.)
|
020 |
|
|
|a 1283308274
|
020 |
|
|
|a 9781283308274
|
020 |
|
|
|a 9786613308276
|
020 |
|
|
|a 6613308277
|
029 |
1 |
|
|a AU@
|b 000059385338
|
029 |
1 |
|
|a CHNEW
|b 000615337
|
029 |
1 |
|
|a DEBSZ
|b 372704298
|
029 |
1 |
|
|a DEBSZ
|b 49309735X
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:000582804
|
029 |
1 |
|
|a NZ1
|b 14691868
|
029 |
1 |
|
|a NZ1
|b 15878759
|
035 |
|
|
|a (OCoLC)763159118
|z (OCoLC)961610329
|z (OCoLC)962610154
|z (OCoLC)965998306
|z (OCoLC)988531994
|z (OCoLC)992014500
|z (OCoLC)1037758209
|z (OCoLC)1038568565
|z (OCoLC)1039416560
|z (OCoLC)1083554632
|z (OCoLC)1103250099
|z (OCoLC)1129360155
|z (OCoLC)1153499199
|z (OCoLC)1162039326
|z (OCoLC)1241910808
|z (OCoLC)1290082674
|z (OCoLC)1300551274
|
050 |
|
4 |
|a QA76.9.A25
|b R36 2011eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ramachandran, Vivek.
|
245 |
1 |
0 |
|a BackTrack 5 wireless penetration testing :
|b beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
|c Vivek Ramachandran.
|
260 |
|
|
|a Birmingham [U.K.] :
|b Packt Pub.,
|c 2011.
|
300 |
|
|
|a 1 online resource (iv, 207 pages) :
|b illustrations (some color)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a "Learn by doing: less theory, more results"--Cover.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|t BackTrack 5 Wireless Penetration Testing --
|t BackTrack 5 Wireless Penetration Testing --
|t Credits --
|t About the Reviewer --
|t www.PacktPub.com --
|t Support files, eBooks, discount offers, and more --
|t Why Subscribe --
|t Free Access for Packt account holders --
|t What this book covers --
|t What you need for this book --
|t Who this book is for --
|t Conventions --
|t Time for action heading --
|t What just happened --
|t Pop quiz heading --
|t Have a go hero heading --
|t Reader feedback --
|t Customer support --
|t Errata --
|t Piracy --
|t Questions --
|g 1.
|t Wireless Lab Setup --
|t Hardware requirements --
|t Software requirements --
|t Installing BackTrack.
|
505 |
0 |
0 |
|t Time for action installing BackTrackWhat just happened --
|t Have a go hero installing BackTrack on Virtual Box --
|t Setting up the access point --
|t Time for action configuring the access point --
|t What just happened --
|t Have a go hero configuring the access point to use WEP and WPA --
|t Setting up the wireless card --
|t Time for action configuring your wireless card --
|t What just happened --
|t Connecting to the access point --
|t Time for action configuring your wireless card --
|t What just happened --
|t Have a go hero establishing connection in WEP configuration --
|t Pop quiz understanding the basics --
|t Summary.
|
505 |
0 |
0 |
|g 2.
|t WLAN and Its Inherent InsecuritiesRevisiting WLAN frames --
|t Time for action creating a monitor mode interface --
|t What just happened --
|t Have a go hero creating multiple monitor mode interfaces --
|t Time for action sniffing wireless packets --
|t What just happened --
|t Have a go hero finding different devices --
|t Time for action viewing Management, Control, and Data frames --
|t What just happened --
|t Have a go hero playing with filters --
|t Time for action sniffing data packets for our network --
|t What just happened --
|t Have a go hero analyzing data packets --
|t Time for action packet injection --
|t What just happened.
|
505 |
0 |
0 |
|t Have a go hero installing BackTrack on Virtual BoxImportant note on WLAN sniffing and injection --
|t Time for action experimenting with your Alfa card --
|t What just happened --
|t Have a go hero sniffing multiple channels --
|t Role of regulatory domains in wireless --
|t Time for action experimenting with your Alfa card --
|t What just happened --
|t Have a go hero exploring regulatory domains --
|t Pop quiz WLAN packet sniffing and injection --
|t Summary --
|g 3.
|t Bypassing WLAN Authentication --
|t Hidden SSIDs --
|t Time for action uncovering hidden SSIDs --
|t What just happened --
|t Have a go hero selecting Deauthentication --
|t MAC filters.
|
505 |
0 |
0 |
|t Time for action beating MAC filtersWhat just happened --
|t Open Authentication --
|t Time for action bypassing Open Authentication --
|t What just happened --
|t Shared Key Authentication --
|t Time for action bypassing Shared Authentication --
|t What just happened --
|t Have a go hero filling up the access point's tables --
|t Pop quiz WLAN authentication --
|t Summary --
|g 4.
|t WLAN Encryption Flaws --
|t WLAN encryption --
|t WEP encryption --
|t Time for action cracking WEP --
|t What just happened --
|t Have a go hero fake authentication with WEP cracking --
|t WPA/WPA2 --
|t Time for action cracking WPA-PSK weak passphrase --
|t What just happened.
|
505 |
0 |
0 |
|t Have a go hero trying WPA-PSK cracking with Cowpatty.
|
520 |
|
|
|a Master bleeding edge wireless testing techniques with BackTrack 5.
|
504 |
|
|
|a Includes index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
758 |
|
|
|i has work:
|a BackTrack 5 wireless penetration testing (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCXHqdTYTMt3twXXrMqrPBd
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
|
|
|z 1-84951-558-1
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=948547
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26943812
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10500143
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 389270
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7188425
|
994 |
|
|
|a 92
|b IZTAP
|