Hacking Wireless Networks For Dummies (notice n° 77082)
[ vue normale ]
000 -LEADER | |
---|---|
fixed length control field | 01593cam a2200289zu 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FRCYB88944109 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250108001735.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250108s2005 fr | o|||||0|0|||eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780764597305 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | FRCYB88944109 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | FR-PaCSA |
Language of cataloging | en |
Transcribing agency | |
Description conventions | rda |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Beaver, Kevin |
245 01 - TITLE STATEMENT | |
Title | Hacking Wireless Networks For Dummies |
Statement of responsibility, etc. | ['Beaver, Kevin', 'Davis, Peter T.'] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Name of producer, publisher, distributor, manufacturer | For Dummies |
Date of production, publication, distribution, manufacture, or copyright notice | 2005 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | p. |
336 ## - CONTENT TYPE | |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type code | c |
Source | rdamdedia |
338 ## - CARRIER TYPE | |
Carrier type code | c |
Source | rdacarrier |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Become a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Beaver, Kevin |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Davis, Peter T. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Access method | Cyberlibris |
Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88944109">https://international.scholarvox.com/netsen/book/88944109</a> |
Electronic format type | text/html |
Host name |
Pas d'exemplaire disponible.
Réseaux sociaux