Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    What I'm Giving | December 1, 2014

    Edward O. Wilson: IMG Edward O. Wilson: What I'm Giving



    At Powell's, we feel the holidays are the perfect time to share our love of books with those close to us. For this special blog series, we reached... Continue »

    spacer
Qualifying orders ship free.
$32.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

This title in other editions

Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks)

by

Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) Cover

 

Synopses & Reviews

Publisher Comments:

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks detailed in this book include:

  1. 802.11 Wireless-Infrastructure Attacks
  2. 802.11 Wireless-Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices

Synopsis:

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

Bluetooth Attacks

Credit Card, Access Card, and Passport Attacks

Bad Encryption

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

Synopsis:

IDENTIFY. CONQUER. DEFEND.

About the Author

Brad "RenderMan" Haines, Contributing Author to RFID Security (

Table of Contents

Introduction Chapter 1: 802.11 Wireless-Infrastructure Attacks Chapter 2: Wireless-Client Attacks Chapter 3: Bluetooth Attacks Chapter 4: Radio Frequency Identification Attacks Chapter 5: Analog Wireless Devices Chapter 6: Bad Encryption Chapter 7: Cell Phones, Personal Digital Assistants, and Other Hybrid Devices

Product Details

ISBN:
9781597495417
Author:
Haines, Brad
Publisher:
Syngress Publishing
Editor:
Kramer, Tim
Subject:
Computer Science
Subject:
Information technology
Subject:
Security - General
Subject:
Hardware - General
Subject:
Computer security
Subject:
Computer networks -- Security measures.
Subject:
Networking-Computer Security
Series:
Seven Deadliest Attacks
Publication Date:
20100431
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
160
Dimensions:
9.30x7.52x.43 in. .76 lbs.

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
History and Social Science » World History » General

Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) New Trade Paper
0 stars - 0 reviews
$32.95 In Stock
Product details 160 pages Syngress Publishing - English 9781597495417 Reviews:
"Synopsis" by , How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

Bluetooth Attacks

Credit Card, Access Card, and Passport Attacks

Bad Encryption

Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally

Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how

Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable

"Synopsis" by , IDENTIFY. CONQUER. DEFEND.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.