|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn613958928 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
100513s2010 mauab ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d CDX
|d MUQ
|d OCLCQ
|d SFB
|d OCLCQ
|d B24X7
|d UMI
|d COO
|d OCLCQ
|d OCLCO
|d VLB
|d DEBSZ
|d OCLCO
|d EBLCP
|d FYM
|d OCLCF
|d OCLCO
|d OCLCQ
|d OCLCO
|d LIV
|d MERUC
|d OCLCQ
|d OCLCA
|d D6H
|d CEF
|d AU@
|d OCLCQ
|d YDX
|d LEAUB
|d UKAHL
|d OL$
|d OCLCQ
|d UHL
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCL
|d OCLCO
|
019 |
|
|
|a 659500137
|a 688587526
|a 793291784
|a 1058125643
|a 1102529752
|
020 |
|
|
|a 9781597495417
|
020 |
|
|
|a 1597495417
|
020 |
|
|
|a 9781597495424
|
020 |
|
|
|a 1597495425
|
029 |
1 |
|
|a AU@
|b 000045964047
|
029 |
1 |
|
|a AU@
|b 000053260380
|
029 |
1 |
|
|a CHNEW
|b 001009664
|
029 |
1 |
|
|a DEBBG
|b BV039827064
|
029 |
1 |
|
|a DEBBG
|b BV040902074
|
029 |
1 |
|
|a DEBBG
|b BV042300682
|
029 |
1 |
|
|a DEBSZ
|b 378295233
|
029 |
1 |
|
|a DEBSZ
|b 381381390
|
029 |
1 |
|
|a DEBSZ
|b 399119272
|
029 |
1 |
|
|a DEBSZ
|b 430857381
|
029 |
1 |
|
|a GBVCP
|b 785360638
|
029 |
1 |
|
|a NZ1
|b 13448982
|
029 |
1 |
|
|a NZ1
|b 15187742
|
029 |
1 |
|
|a AU@
|b 000060584853
|
029 |
1 |
|
|a AU@
|b 000067100291
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110229805765
|
035 |
|
|
|a (OCoLC)613958928
|z (OCoLC)659500137
|z (OCoLC)688587526
|z (OCoLC)793291784
|z (OCoLC)1058125643
|z (OCoLC)1102529752
|
037 |
|
|
|a 1094073:10885961
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a TK5103.2
|b .H325 2010
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Haines, Brad.
|
245 |
1 |
0 |
|a Seven deadliest wireless technologies attacks /
|c Brad Haines ; technical editor, Tim Kramer.
|
260 |
|
|
|a Burlington, MA :
|b Syngress/Elsevier,
|c ©2010.
|
300 |
|
|
|a 1 online resource (xvi, 122 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Syngress seven deadliest attacks series
|
520 |
|
|
|a How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
|
505 |
0 |
|
|a Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a 802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Wireless communication systems.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Computer Communication Networks
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Transmission sans fil.
|
650 |
|
6 |
|a Transmission sans fil
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Wireless communication systems
|2 fast
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Haines, Brad.
|t Seven deadliest wireless technologies attacks.
|d Burlington, MA : Syngress/Elsevier, ©2010
|z 9781597495417
|z 1597495417
|w (DLC) 2010014460
|w (OCoLC)609304010
|
830 |
|
0 |
|a Syngress seven deadliest attacks series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495417/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23095067
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00036369
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 14948503
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL535138
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3250301
|
994 |
|
|
|a 92
|b IZTAP
|