WarDriving & wireless penetration testing:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes index Cover; Contents; Foreword; Foreword v 1.0; Chapter 1 Introduction to WarDriving and Penetration Testing; Chapter 2 Understanding Antennas and Antenna Theory; Chapter 3 Handheld Devices and Direction Finding; Chapter 4 WarDriving and Penetration Testing with Windows; Chapter 5 WarDriving and Penetration Testing with Linux; Chapter 6 WarDriving and Wireless Penetration Testing with OS X; Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution; Chapter 8 Mapping WarDrives; Chapter 9 Using Man-in-the- Middle Attacks to Your Advantage Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing |
Beschreibung: | 1 Online-Ressource (xxix, 400 p.) |
ISBN: | 0080520774 1281112623 159749111X 1597491616 9780080520773 9781281112620 9781597491112 9781597491617 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043108233 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080520774 |c electronic bk. |9 0-08-052077-4 | ||
020 | |a 1281112623 |9 1-281-11262-3 | ||
020 | |a 159749111X |9 1-59749-111-X | ||
020 | |a 1597491616 |c electronic bk. |9 1-59749-161-6 | ||
020 | |a 9780080520773 |c electronic bk. |9 978-0-08-052077-3 | ||
020 | |a 9781281112620 |9 978-1-281-11262-0 | ||
020 | |a 9781597491112 |9 978-1-59749-111-2 | ||
020 | |a 9781597491617 |c electronic bk. |9 978-1-59749-161-7 | ||
035 | |a (OCoLC)77521476 | ||
035 | |a (DE-599)BVBBV043108233 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a WarDriving & wireless penetration testing |c Chris Hurley ... [et al.] |
246 | 1 | 3 | |a WarDriving and wireless penetration testing |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c c2007 | |
300 | |a 1 Online-Ressource (xxix, 400 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Cover; Contents; Foreword; Foreword v 1.0; Chapter 1 Introduction to WarDriving and Penetration Testing; Chapter 2 Understanding Antennas and Antenna Theory; Chapter 3 Handheld Devices and Direction Finding; Chapter 4 WarDriving and Penetration Testing with Windows; Chapter 5 WarDriving and Penetration Testing with Linux; Chapter 6 WarDriving and Wireless Penetration Testing with OS X; Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution; Chapter 8 Mapping WarDrives; Chapter 9 Using Man-in-the- Middle Attacks to Your Advantage | ||
500 | |a Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 blmlsh | |
650 | 7 | |a Wireless LANs / Security measures |2 blmlsh | |
650 | 7 | |a Computer security |2 blmlsh | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 4 | |a Computer security | |
700 | 1 | |a Hurley, Chris |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028532424 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175525059493888 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043108233 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)77521476 (DE-599)BVBBV043108233 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03283nmm a2200589zc 4500</leader><controlfield tag="001">BV043108233</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080520774</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-052077-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281112623</subfield><subfield code="9">1-281-11262-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159749111X</subfield><subfield code="9">1-59749-111-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491616</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-161-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080520773</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-052077-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281112620</subfield><subfield code="9">978-1-281-11262-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491112</subfield><subfield code="9">978-1-59749-111-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491617</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-161-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)77521476</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043108233</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">WarDriving & wireless penetration testing</subfield><subfield code="c">Chris Hurley ... [et al.]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">WarDriving and wireless penetration testing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxix, 400 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; Foreword; Foreword v 1.0; Chapter 1 Introduction to WarDriving and Penetration Testing; Chapter 2 Understanding Antennas and Antenna Theory; Chapter 3 Handheld Devices and Direction Finding; Chapter 4 WarDriving and Penetration Testing with Windows; Chapter 5 WarDriving and Penetration Testing with Linux; Chapter 6 WarDriving and Wireless Penetration Testing with OS X; Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution; Chapter 8 Mapping WarDrives; Chapter 9 Using Man-in-the- Middle Attacks to Your Advantage</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hurley, Chris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028532424</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043108233 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:40Z |
institution | BVB |
isbn | 0080520774 1281112623 159749111X 1597491616 9780080520773 9781281112620 9781597491112 9781597491617 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028532424 |
oclc_num | 77521476 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxix, 400 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress Pub. |
record_format | marc |
spelling | WarDriving & wireless penetration testing Chris Hurley ... [et al.] WarDriving and wireless penetration testing Rockland, MA Syngress Pub. c2007 1 Online-Ressource (xxix, 400 p.) txt rdacontent c rdamedia cr rdacarrier Includes index Cover; Contents; Foreword; Foreword v 1.0; Chapter 1 Introduction to WarDriving and Penetration Testing; Chapter 2 Understanding Antennas and Antenna Theory; Chapter 3 Handheld Devices and Direction Finding; Chapter 4 WarDriving and Penetration Testing with Windows; Chapter 5 WarDriving and Penetration Testing with Linux; Chapter 6 WarDriving and Wireless Penetration Testing with OS X; Chapter 7 Wireless Penetration Testing Using a Bootable Linux Distribution; Chapter 8 Mapping WarDrives; Chapter 9 Using Man-in-the- Middle Attacks to Your Advantage Wireless networking has become standard in many business and government networks. Aimed primarily at those individuals that are tasked with performing penetration testing on wireless networks, this book focuses on the methods used by professionals to perform WarDriving and wireless penetration testing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Wireless communication systems / Security measures blmlsh Wireless LANs / Security measures blmlsh Computer security blmlsh Wireless communication systems Security measures Wireless LANs Security measures Computer security Hurley, Chris Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007 Aggregator Volltext |
spellingShingle | WarDriving & wireless penetration testing COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Wireless communication systems / Security measures blmlsh Wireless LANs / Security measures blmlsh Computer security blmlsh Wireless communication systems Security measures Wireless LANs Security measures Computer security |
title | WarDriving & wireless penetration testing |
title_alt | WarDriving and wireless penetration testing |
title_auth | WarDriving & wireless penetration testing |
title_exact_search | WarDriving & wireless penetration testing |
title_full | WarDriving & wireless penetration testing Chris Hurley ... [et al.] |
title_fullStr | WarDriving & wireless penetration testing Chris Hurley ... [et al.] |
title_full_unstemmed | WarDriving & wireless penetration testing Chris Hurley ... [et al.] |
title_short | WarDriving & wireless penetration testing |
title_sort | wardriving wireless penetration testing |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Wireless communication systems / Security measures blmlsh Wireless LANs / Security measures blmlsh Computer security blmlsh Wireless communication systems Security measures Wireless LANs Security measures Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Wireless communication systems / Security measures Wireless LANs / Security measures Wireless communication systems Security measures Wireless LANs Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=176007 |
work_keys_str_mv | AT hurleychris wardrivingwirelesspenetrationtesting AT hurleychris wardrivingandwirelesspenetrationtesting |