WarDriving & wireless penetration testing /

Saved in:
Bibliographic Details
Imprint:Rockland, MA : Syngress Pub., ©2007.
Description:1 online resource (xxix, 400 pages) : illustrations
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11149691
Hidden Bibliographic Details
Varying Form of Title:WarDriving and wireless penetration testing
Other authors / contributors:Hurley, Chris.
ISBN:9780080520773
0080520774
9781597491112
159749111X
1597491616
9781597491617
1281112623
9781281112620
Notes:Print version record.
Summary:Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing.
Other form:Print version: WarDriving & wireless penetration testing. Rockland, MA : Syngress Pub., ©2007 159749111X 9781597491112
Standard no.:792502091111
Description
Summary:Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008. * The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers. * Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks.
Physical Description:1 online resource (xxix, 400 pages) : illustrations
ISBN:9780080520773
0080520774
9781597491112
159749111X
1597491616
9781597491617
1281112623
9781281112620