Listing 1 - 6 of 6
Sort by

Digital
Seven deadliest wireless technologies attacks
Author:
ISBN: 9781597495417 1597495417 9781597495424 1597495425 Year: 2010 Publisher: Burlington, MA Syngress/Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include: Bluetooth Attacks Credit Card, Access Card, and Passport Attacks Bad Encryption Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.


Book
Seven deadliest wireless technologies attacks
Authors: ---
ISBN: 1282738224 9786612738227 1597495425 1597495417 9781597495417 9781597495424 9781282738225 Year: 2010 Publisher: Amersterdam ; Boston : Syngress/Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: 802.11 Wireless-

Kismet hacking
Authors: --- ---
ISBN: 1282768956 9786612768958 0080558704 1597491179 9781597491174 9780080558707 9781282768956 Year: 2008 Publisher: Burlington, MA : Syngress Publishing, Inc.,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book co

Kismet hacking
Authors: --- ---
ISBN: 9781597491174 1597491179 9780080558707 0080558704 1282768956 9781282768956 Year: 2008 Publisher: Burlington, MA Syngress Pub

Loading...
Export citation

Choose an application

Bookmark

Abstract

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive.

Keywords

RFID security
Authors: --- --- ---
ISBN: 1597490474 1423771605 9781423771609 9780080489650 0080489656 9781597491082 159749108X Year: 2006 Publisher: Rockland Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID system would allow a.

RFID security
Authors: --- --- --- --- --- et al.
ISBN: 1597490474 1423771605 9781423771609 9780080489650 0080489656 9781597491082 159749108X 1281035653 9786611035655 9781597490474 9781281035653 6611035656 Year: 2006 Publisher: Rockland, MA : Syngress Publishing,

Loading...
Export citation

Choose an application

Bookmark

Abstract

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from food, dogs, beer kegs to library books. RFID tags use a standard that has already been hacked by several researchers. RFID Security discusses the motives for someone wanting to hack an RFID system and shows how to protect systems. Coverage includes: security breaches for monetary gain (hacking a shops RFID syst

Listing 1 - 6 of 6
Sort by