000 | 01593cam a2200289zu 4500 | ||
---|---|---|---|
001 | 88944109 | ||
003 | FRCYB88944109 | ||
005 | 20250108001735.0 | ||
006 | m o d | ||
007 | cr un | ||
008 | 250108s2005 fr | o|||||0|0|||eng d | ||
020 | _a9780764597305 | ||
035 | _aFRCYB88944109 | ||
040 |
_aFR-PaCSA _ben _c _erda |
||
100 | 1 | _aBeaver, Kevin | |
245 | 0 | 1 |
_aHacking Wireless Networks For Dummies _c['Beaver, Kevin', 'Davis, Peter T.'] |
264 | 1 |
_bFor Dummies _c2005 |
|
300 | _a p. | ||
336 |
_btxt _2rdacontent |
||
337 |
_bc _2rdamdedia |
||
338 |
_bc _2rdacarrier |
||
650 | 0 | _a | |
700 | 0 | _aBeaver, Kevin | |
700 | 0 | _aDavis, Peter T. | |
856 | 4 | 0 |
_2Cyberlibris _uhttps://international.scholarvox.com/netsen/book/88944109 _qtext/html _a |
520 | _aBecome a cyber-hero - know the common wireless weaknesses "Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." --Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor. Discover how to: Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices | ||
999 |
_c77082 _d77082 |