Hacking Wireless Networks For Dummies

Hacking Wireless Networks For Dummies

3.5 4
by Kevin Beaver, Peter T. Davis
     
 

View All Available Formats & Editions

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like

Overview

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices

Product Details

ISBN-13:
9780764597305
Publisher:
Wiley
Publication date:
09/13/2005
Series:
For Dummies Series
Edition description:
Older Edition
Pages:
384
Sales rank:
601,947
Product dimensions:
7.50(w) x 9.25(h) x 0.80(d)

Meet the Author

Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response.

Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >

Hacking Wireless Networks For Dummies 3.5 out of 5 based on 0 ratings. 4 reviews.
Anonymous More than 1 year ago
I learnd how to use BackTrack!
Anonymous More than 1 year ago
I hacked someone
Anonymous More than 1 year ago
Anonymous More than 1 year ago
Booooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooooo