Seven Deadliest Wireless Technologies Attacks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Seven Deadliest Wireless Technologies Attacks by Brad Haines, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Brad Haines ISBN: 9781597495424
Publisher: Elsevier Science Publication: March 13, 2010
Imprint: Syngress Language: English
Author: Brad Haines
ISBN: 9781597495424
Publisher: Elsevier Science
Publication: March 13, 2010
Imprint: Syngress
Language: English

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.

This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Attacks detailed in this book include:

  1. 802.11 Wireless—Infrastructure Attacks
  2. 802.11 Wireless—Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.

This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Attacks detailed in this book include:

  1. 802.11 Wireless—Infrastructure Attacks
  2. 802.11 Wireless—Client Attacks
  3. Bluetooth Attacks
  4. RFID Attacks
  5. Analog Wireless Device Attacks
  6. Bad Encryption
  7. Attacks on Cell Phones, PDAs and Other Hybrid Devices

More books from Elsevier Science

Cover of the book Mesoscale Modeling in Chemical Engineering Part II by Brad Haines
Cover of the book Pericyclic Reactions by Brad Haines
Cover of the book Advances in Cancer Research by Brad Haines
Cover of the book MCSE Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure (Exam 70-294) by Brad Haines
Cover of the book Humpback Dolphins (Sousa spp.): Current Status and Conservation, Part 2 by Brad Haines
Cover of the book Efficiency and Competition in Chinese Banking by Brad Haines
Cover of the book Research Methods in Biomineralization Science by Brad Haines
Cover of the book A Practical Guide to Writing a Ruth L. Kirschstein NRSA Grant by Brad Haines
Cover of the book Advances in Applied Microbiology by Brad Haines
Cover of the book Obesity Prevention by Brad Haines
Cover of the book Population Limitation in Birds by Brad Haines
Cover of the book Advances in Quantum Chemistry by Brad Haines
Cover of the book Adsorption of Metals by Geomedia by Brad Haines
Cover of the book Strategies and Tactics in Organic Synthesis by Brad Haines
Cover of the book A Practical Guide to SysML by Brad Haines
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy