|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1041858401 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
180625s2018 xx 104 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d TOH
|d S9I
|d OCLCQ
|d OCLCO
|
035 |
|
|
|a (OCoLC)1041858401
|
037 |
|
|
|a CL0500000974
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.59
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dion, Jason,
|e on-screen presenter.
|
245 |
1 |
0 |
|a WiFi hacking :
|b wireless penetration testing for beginners /
|c Jason Dion.
|
246 |
1 |
|
|i Title on title screen:
|a Introduction to wireless hacking
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 43 min., 1 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
380 |
|
|
|a Videorecording
|
511 |
0 |
|
|a Presenter, Jason Dion.
|
500 |
|
|
|a Title from resource description page (Safari, viewed June 21, 2018).
|
520 |
|
|
|a "This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781789530193/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|