|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn801440327 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
120606s2012 nyua o 001 0 eng d |
010 |
|
|
|a 2012016185
|
040 |
|
|
|a CDX
|b eng
|e pn
|c CDX
|d OCLCO
|d UMI
|d OCLCQ
|d COO
|d OCLCQ
|d DEBSZ
|d TEFOD
|d OCLCQ
|d OCLCF
|d OCLCO
|d YDXCP
|d IDEBK
|d MBB
|d OCLCO
|d TEFOD
|d OCLCQ
|d MYSZA
|d OCLCQ
|d EBLCP
|d TOF
|d D6H
|d LIV
|d TOH
|d RDF
|d OCLCQ
|d N$T
|d VT2
|d YDX
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 817081877
|a 819322852
|a 1153027891
|a 1268951310
|
020 |
|
|
|a 9780071760959
|q (electronic bk.)
|
020 |
|
|
|a 0071760954
|q (electronic bk.)
|
020 |
|
|
|a 1280587660
|
020 |
|
|
|a 9781280587665
|
020 |
|
|
|z 9780071760942
|
020 |
|
|
|z 0071760946
|
024 |
8 |
|
|a 9786613617491
|
029 |
1 |
|
|a AU@
|b 000050347939
|
029 |
1 |
|
|a AU@
|b 000053283058
|
029 |
1 |
|
|a DEBBG
|b BV040903235
|
029 |
1 |
|
|a DEBSZ
|b 37827497X
|
029 |
1 |
|
|a DEBSZ
|b 381392961
|
035 |
|
|
|a (OCoLC)801440327
|z (OCoLC)817081877
|z (OCoLC)819322852
|z (OCoLC)1153027891
|z (OCoLC)1268951310
|
037 |
|
|
|a 361749
|b MIL
|
037 |
|
|
|a 13428D93-BFB2-4ACE-AB70-D55CF5C5AF91
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.78
|b .W75 2012eb
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Wrightson, Tyler.
|
245 |
1 |
0 |
|a Wireless network security :
|b a beginner's guide /
|c Tyler Wrightson.
|
260 |
|
|
|a New York :
|b McGraw-Hill,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xvii, 347 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. Introduction to the wireless security mindset -- 2. Wireless tools and gadgets -- 3. Theory of attacks on wireless networks -- 4. Attacking wireless networks -- 5. Attacking wireless clients -- 6. Theory of defense for securing wireless networks -- 7. Understanding the WPA2-enterprise with certificates architecture -- 8. Deploying a WPA-enterprise nwetwork with certificates -- 9. Deploying secure wireless networks -- 10. Handling wireless guest access -- 11. Handling rogue access points and the future of wireless security.
|
520 |
|
|
|a Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Wireless LANs
|x Security measures.
|
650 |
|
6 |
|a Réseaux locaux sans fil
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Wireless LANs
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computersicherheit
|2 gnd
|
650 |
|
7 |
|a Datensicherung
|2 gnd
|
650 |
|
7 |
|a Drahtloses lokales Netz
|2 gnd
|
650 |
|
7 |
|a Electrical & Computer Engineering.
|2 hilcc
|
650 |
|
7 |
|a Engineering & Applied Sciences.
|2 hilcc
|
650 |
|
7 |
|a Telecommunications.
|2 hilcc
|
776 |
0 |
8 |
|i Print version:
|z 9786613617491
|w (OCoLC)772967841
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071760942/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4960629
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 22302637
|c 40.00 USD
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 361749
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12087421
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686979
|
994 |
|
|
|a 92
|b IZTAP
|