Kismet hacking:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
c2008
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes index Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive |
Beschreibung: | 1 Online-Ressource (xi, 258 p.) |
ISBN: | 9781597491174 1597491179 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305744 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781597491174 |9 978-1-59749-117-4 | ||
020 | |a 1597491179 |9 1-59749-117-9 | ||
035 | |a (OCoLC)272383149 | ||
035 | |a (DE-599)BVBBV042305744 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Haines, Brad |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kismet hacking |c Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c c2008 | |
300 | |a 1 Online-Ressource (xi, 258 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive | ||
630 | 0 | 4 | |a Kismet (Electronic resource) |
650 | 7 | |a Kismet (Electronic resource) |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Schearer, Michael J. |e Sonstige |4 oth | |
700 | 1 | |a Thornton, Frank |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491174 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742736 |
Datensatz im Suchindex
_version_ | 1804152889196675072 |
---|---|
any_adam_object | |
author | Haines, Brad |
author_facet | Haines, Brad |
author_role | aut |
author_sort | Haines, Brad |
author_variant | b h bh |
building | Verbundindex |
bvnumber | BV042305744 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)272383149 (DE-599)BVBBV042305744 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02360nmm a2200445zc 4500</leader><controlfield tag="001">BV042305744</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491174</subfield><subfield code="9">978-1-59749-117-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491179</subfield><subfield code="9">1-59749-117-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)272383149</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305744</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kismet hacking</subfield><subfield code="c">Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 258 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Kismet (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kismet (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schearer, Michael J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thornton, Frank</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491174</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742736</subfield></datafield></record></collection> |
id | DE-604.BV042305744 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:53Z |
institution | BVB |
isbn | 9781597491174 1597491179 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742736 |
oclc_num | 272383149 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xi, 258 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Haines, Brad Verfasser aut Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton Burlington, MA Syngress Pub. c2008 1 Online-Ressource (xi, 258 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive Kismet (Electronic resource) Kismet (Electronic resource) fast Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures Schearer, Michael J. Sonstige oth Thornton, Frank Sonstige oth http://www.sciencedirect.com/science/book/9781597491174 Verlag Volltext |
spellingShingle | Haines, Brad Kismet hacking Kismet (Electronic resource) Kismet (Electronic resource) fast Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures |
title | Kismet hacking |
title_auth | Kismet hacking |
title_exact_search | Kismet hacking |
title_full | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_fullStr | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_full_unstemmed | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_short | Kismet hacking |
title_sort | kismet hacking |
topic | Kismet (Electronic resource) Kismet (Electronic resource) fast Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures |
topic_facet | Kismet (Electronic resource) Computer networks / Security measures Wireless communication systems / Security measures Wireless communication systems Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597491174 |
work_keys_str_mv | AT hainesbrad kismethacking AT schearermichaelj kismethacking AT thorntonfrank kismethacking |