Cargando…

WiFi hacking : wireless penetration testing for beginners /

"This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks hav...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Packt Publishing, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1041858401
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180625s2018 xx 104 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d TOH  |d S9I  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1041858401 
037 |a CL0500000974  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Dion, Jason,  |e on-screen presenter. 
245 1 0 |a WiFi hacking :  |b wireless penetration testing for beginners /  |c Jason Dion. 
246 1 |i Title on title screen:  |a Introduction to wireless hacking 
264 1 |a [Place of publication not identified] :  |b Packt Publishing,  |c 2018. 
300 |a 1 online resource (1 streaming video file (1 hr., 43 min., 1 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Videorecording 
511 0 |a Presenter, Jason Dion. 
500 |a Title from resource description page (Safari, viewed June 21, 2018). 
520 |a "This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Piratage informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Tests d'intrusion. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781789530193/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP