Absolutely Australia's Lowest Prices

We won't be beaten by anyone. Guaranteed

Hacking Wireless Networks For Dummies

This book enables readers to become a cyber hero and know the common wireless weaknesses. "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." - Devin Akin CTO, The Certified Wireless Network Professional (CWNP) Program. Wireless networks are so convenient not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: perform ethical hacks without compromising a system; combat denial of service and WEP attacks; understand how invaders think; recognize the effects of different hacks; and protect against war drivers and rogue devices.
Product Details

Table of Contents

Foreword. Introduction. Part I: Building the Foundation for Testing Wireless Networks. Chapter 1: Introduction to Wireless Hacking. Chapter 2: The Wireless Hacking Process. Chapter 3: Implementing a Testing Methodology. Chapter 4: Amassing Your War Chest. Part II: Getting Rolling with Common Wi-Fi Hacks. Chapter 5: Human (In)Security. Chapter 6: Containing the Airwaves. Chapter 7: Hacking Wireless Clients. Chapter 8: Discovering Default Settings. Chapter 9: Wardriving. Part III: Advanced Wi-Fi Hacks. Chapter 10: Still at War. Chapter 11: Unauthorized Wireless Devices. Chapter 12: Network Attacks. Chapter 13: Denial-of-Service Attacks. Chapter 14: Cracking Encryption. Chapter 15: Authenticating Users. Part IV: The Part of Tens. Chapter 16: Ten Essential Tools for Hacking Wireless Networks. Chapter 17: Ten Wireless Security-Testing Mistakes. Chapter 18: Ten Tips for Following Up after Your Testing. Part V: Appendixes. Appendix A: Wireless Hacking Resources. Appendix B: Glossary of Acronyms. Index.

About the Author

Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response. Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.

Look for similar items by category
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Hacking Wireless Networks For Dummies on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top