Cargando…

Seven deadliest wireless technologies attacks /

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Haines, Brad
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress/Elsevier, ©2010.
Colección:Syngress seven deadliest attacks series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn613958928
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 100513s2010 mauab ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d MUQ  |d OCLCQ  |d SFB  |d OCLCQ  |d B24X7  |d UMI  |d COO  |d OCLCQ  |d OCLCO  |d VLB  |d DEBSZ  |d OCLCO  |d EBLCP  |d FYM  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d LIV  |d MERUC  |d OCLCQ  |d OCLCA  |d D6H  |d CEF  |d AU@  |d OCLCQ  |d YDX  |d LEAUB  |d UKAHL  |d OL$  |d OCLCQ  |d UHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCL  |d OCLCO 
019 |a 659500137  |a 688587526  |a 793291784  |a 1058125643  |a 1102529752 
020 |a 9781597495417 
020 |a 1597495417 
020 |a 9781597495424 
020 |a 1597495425 
029 1 |a AU@  |b 000045964047 
029 1 |a AU@  |b 000053260380 
029 1 |a CHNEW  |b 001009664 
029 1 |a DEBBG  |b BV039827064 
029 1 |a DEBBG  |b BV040902074 
029 1 |a DEBBG  |b BV042300682 
029 1 |a DEBSZ  |b 378295233 
029 1 |a DEBSZ  |b 381381390 
029 1 |a DEBSZ  |b 399119272 
029 1 |a DEBSZ  |b 430857381 
029 1 |a GBVCP  |b 785360638 
029 1 |a NZ1  |b 13448982 
029 1 |a NZ1  |b 15187742 
029 1 |a AU@  |b 000060584853 
029 1 |a AU@  |b 000067100291 
029 1 |a DKDLA  |b 820120-katalog:9910110229805765 
035 |a (OCoLC)613958928  |z (OCoLC)659500137  |z (OCoLC)688587526  |z (OCoLC)793291784  |z (OCoLC)1058125643  |z (OCoLC)1102529752 
037 |a 1094073:10885961  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5103.2  |b .H325 2010 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Haines, Brad. 
245 1 0 |a Seven deadliest wireless technologies attacks /  |c Brad Haines ; technical editor, Tim Kramer. 
260 |a Burlington, MA :  |b Syngress/Elsevier,  |c ©2010. 
300 |a 1 online resource (xvi, 122 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress seven deadliest attacks series 
520 |a How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. 
505 0 |a Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones. 
504 |a Includes bibliographical references and index. 
505 0 |a 802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices. 
588 0 |a Print version record. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer networks. 
650 0 |a Wireless communication systems. 
650 2 |a Computer Security 
650 2 |a Computer Communication Networks 
650 6 |a Réseaux d'ordinateurs. 
650 6 |a Transmission sans fil. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Wireless communication systems  |2 fast 
650 7 |a Computer networks  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Haines, Brad.  |t Seven deadliest wireless technologies attacks.  |d Burlington, MA : Syngress/Elsevier, ©2010  |z 9781597495417  |z 1597495417  |w (DLC) 2010014460  |w (OCoLC)609304010 
830 0 |a Syngress seven deadliest attacks series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495417/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23095067 
938 |a Books 24x7  |b B247  |n bks00036369 
938 |a Coutts Information Services  |b COUT  |n 14948503 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL535138 
938 |a YBP Library Services  |b YANK  |n 3250301 
994 |a 92  |b IZTAP