Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Seven deadliest wireless technologie...
~
Haines, Brad.
Seven deadliest wireless technologies attacks
Record Type:
Electronic resources : Monograph/item
Title/Author:
Seven deadliest wireless technologies attacksBrad Haines ; technical editor, Tim Kramer.
Author:
Haines, Brad.
Published:
Burlington, MA :Syngress/Elsevier,c2010.
Description:
1 online resource (xvi, 122 p.) :ill.
Subject:
Wireless communication systemsSecurity measures.
Online resource:
http://www.sciencedirect.com/science/book/9781597495417
ISBN:
9781597495417
Seven deadliest wireless technologies attacks
Haines, Brad.
Seven deadliest wireless technologies attacks
[electronic resource] /Brad Haines ; technical editor, Tim Kramer. - Burlington, MA :Syngress/Elsevier,c2010. - 1 online resource (xvi, 122 p.) :ill. - Syngress seven deadliest attacks series. - Syngress seven deadliest attacks series..
Includes bibliographical references and index.
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
ISBN: 9781597495417
Source: 1094073:10885961Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
208191
Wireless communication systems
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5103.2 / .H325 2010
Dewey Class. No.: 005.8
Seven deadliest wireless technologies attacks
LDR
:02961cmm 2200385Ia 4500
001
314206
003
OCoLC
005
20111122091344.0
006
m d
007
cr cn|||||||||
008
111229s2010 mauab ob 001 0 eng d
019
$a
688587526
020
$a
9781597495417
020
$a
1597495417
029
1
$a
AU@
$b
000045964047
029
1
$a
NZ1
$b
13448982
035
$a
(OCoLC)613958928
$z
(OCoLC)688587526
035
$a
ocn613958928
037
$a
1094073:10885961
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
CDX
$d
MUQ
$d
OCLCQ
$d
SFB
$d
OCLCQ
049
$a
TEFA
050
4
$a
TK5103.2
$b
.H325 2010
082
0 4
$a
005.8
$2
22
100
1
$a
Haines, Brad.
$3
538163
245
1 0
$a
Seven deadliest wireless technologies attacks
$h
[electronic resource] /
$c
Brad Haines ; technical editor, Tim Kramer.
260
$a
Burlington, MA :
$b
Syngress/Elsevier,
$c
c2010.
300
$a
1 online resource (xvi, 122 p.) :
$b
ill.
490
1
$a
Syngress seven deadliest attacks series
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction -- Chapter 1: 802.11 Wireless-Infrastructure Attacks -- Chapter 2: 802.11 Wireless-Client Attacks -- Chapter 3: Bluetooth Attacks -- Chapter 4: Credit Card, Access Card, and Passport Attacks -- Chapter 5: Analog Wireless Devices -- Chapter 6: Bad Encryption -- Chapter 7: Cell Phones / Smart Phones.
505
0
$a
802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.
520
$a
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
588
$a
Description based on print version record.
650
0
$a
Wireless communication systems
$x
Security measures.
$3
208191
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
0
$a
Computer security.
$3
184416
650
6
$a
R�eseaux d'ordinateurs.
$3
340854
650
6
$a
Transmission sans fil.
$3
340994
655
4
$a
Electronic books.
$2
local.
$3
214472
776
0 8
$i
Print version:
$a
Haines, Brad.
$t
Seven deadliest wireless technologies attacks.
$d
Burlington, MA : Syngress/Elsevier, c2010
$z
9781597495417
$z
1597495417
$w
(DLC) 2010014460
$w
(OCoLC)609304010
830
0
$a
Syngress seven deadliest attacks series.
$3
538164
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597495417
938
$a
Coutts Information Services
$b
COUT
$n
14948503
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000061170
電子館藏
1圖書
電子書
EB TK5103.2 .H325 c2010
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597495417
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login