|Other Retailer||Price Checked Time||Their Price in AUD||Our Price|
|Amazon UK||22 days ago||76.1||$39.71||You save $36.39|
|Book Depository US||5 days ago||40.1||$39.71||You save $0.39|
Foreword. Introduction. Part I: Building the Foundation for Testing Wireless Networks. Chapter 1: Introduction to Wireless Hacking. Chapter 2: The Wireless Hacking Process. Chapter 3: Implementing a Testing Methodology. Chapter 4: Amassing Your War Chest. Part II: Getting Rolling with Common Wi-Fi Hacks. Chapter 5: Human (In)Security. Chapter 6: Containing the Airwaves. Chapter 7: Hacking Wireless Clients. Chapter 8: Discovering Default Settings. Chapter 9: Wardriving. Part III: Advanced Wi-Fi Hacks. Chapter 10: Still at War. Chapter 11: Unauthorized Wireless Devices. Chapter 12: Network Attacks. Chapter 13: Denial-of-Service Attacks. Chapter 14: Cracking Encryption. Chapter 15: Authenticating Users. Part IV: The Part of Tens. Chapter 16: Ten Essential Tools for Hacking Wireless Networks. Chapter 17: Ten Wireless Security-Testing Mistakes. Chapter 18: Ten Tips for Following Up after Your Testing. Part V: Appendixes. Appendix A: Wireless Hacking Resources. Appendix B: Glossary of Acronyms. Index.
Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response. Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.