BackTrack: Testing Wireless Network Security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2013
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | Includes index Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing and Configuring BackTrack; Downloading and configuring BackTrack; Installing BackTrack; Updating BackTrack; Validating the interfaces; Customizing Gnome; New wave theme; Creating a virtual machine; Summary; Chapter 2: Working with the Wireless Card; Checking card compatibility; Detecting the wireless card during the boot process; Detecting the wireless card using iwconfig; Configuring the wireless card; Wireless card modes Protocol analysis with the network cardSummary; Chapter 3: Surveying Your Wireless Zone; Exploring devices; Working with tools; Using Kismet for access point discovery; Discovering hidden access points; Summary; Chapter 4: Breaching Wireless Security; Different types of attacks; Cracking WEP and WPA; Performing an attack using WEP and ChopChop; Summary; Chapter 5: Securing Your Wireless Network; Configuring initial wireless security; Defending from surveillance; Configuring encryption; Settings that provide protection from masquerade and rogue AP attacks; Summary; Appendix: Wireless Tools Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. All you need is some experience with networks and computers and you will be ready to go |
Beschreibung: | 108 pages |
ISBN: | 9781782164074 1782164073 1782164065 9781782164067 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043776633 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781782164074 |9 978-1-78216-407-4 | ||
020 | |a 1782164073 |9 1-78216-407-3 | ||
020 | |a 1782164065 |9 1-78216-406-5 | ||
020 | |a 9781782164067 |9 978-1-78216-406-7 | ||
020 | |a 9781782164067 |9 978-1-78216-406-7 | ||
035 | |a (ZDB-4-EBA)ocn852756685 | ||
035 | |a (ZDB-4-ITC)ocn852756685 | ||
035 | |a (OCoLC)852756685 | ||
035 | |a (DE-599)BVBBV043776633 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 621.382 |2 23 | |
100 | 1 | |a Cardwell, Kevin |d active 2001 |e Verfasser |4 aut | |
245 | 1 | 0 | |a BackTrack |b Testing Wireless Network Security |
264 | 1 | |a Birmingham |b Packt Publishing |c 2013 | |
300 | |a 108 pages | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Includes index | ||
500 | |a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing and Configuring BackTrack; Downloading and configuring BackTrack; Installing BackTrack; Updating BackTrack; Validating the interfaces; Customizing Gnome; New wave theme; Creating a virtual machine; Summary; Chapter 2: Working with the Wireless Card; Checking card compatibility; Detecting the wireless card during the boot process; Detecting the wireless card using iwconfig; Configuring the wireless card; Wireless card modes | ||
500 | |a Protocol analysis with the network cardSummary; Chapter 3: Surveying Your Wireless Zone; Exploring devices; Working with tools; Using Kismet for access point discovery; Discovering hidden access points; Summary; Chapter 4: Breaching Wireless Security; Different types of attacks; Cracking WEP and WPA; Performing an attack using WEP and ChopChop; Summary; Chapter 5: Securing Your Wireless Network; Configuring initial wireless security; Defending from surveillance; Configuring encryption; Settings that provide protection from masquerade and rogue AP attacks; Summary; Appendix: Wireless Tools | ||
500 | |a Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. All you need is some experience with networks and computers and you will be ready to go | ||
650 | 4 | |a Wireless communication systems / Security measures / Testing | |
650 | 4 | |a Computer networks / Security measures / Testing | |
650 | 4 | |a Open source software | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Telecommunications |2 bisacsh | |
650 | 4 | |a Wireless communication systems |x Security measures |x Testing | |
650 | 4 | |a Computer networks |x Security measures |x Testing | |
650 | 4 | |a Open source software | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029187693 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=604062 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=604062 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176603472723968 |
---|---|
any_adam_object | |
author | Cardwell, Kevin active 2001 |
author_facet | Cardwell, Kevin active 2001 |
author_role | aut |
author_sort | Cardwell, Kevin active 2001 |
author_variant | k c kc |
building | Verbundindex |
bvnumber | BV043776633 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn852756685 (ZDB-4-ITC)ocn852756685 (OCoLC)852756685 (DE-599)BVBBV043776633 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03429nmm a2200517zc 4500</leader><controlfield tag="001">BV043776633</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782164074</subfield><subfield code="9">978-1-78216-407-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782164073</subfield><subfield code="9">1-78216-407-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782164065</subfield><subfield code="9">1-78216-406-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782164067</subfield><subfield code="9">978-1-78216-406-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782164067</subfield><subfield code="9">978-1-78216-406-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn852756685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn852756685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)852756685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043776633</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cardwell, Kevin</subfield><subfield code="d">active 2001</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">BackTrack</subfield><subfield code="b">Testing Wireless Network Security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">108 pages</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing and Configuring BackTrack; Downloading and configuring BackTrack; Installing BackTrack; Updating BackTrack; Validating the interfaces; Customizing Gnome; New wave theme; Creating a virtual machine; Summary; Chapter 2: Working with the Wireless Card; Checking card compatibility; Detecting the wireless card during the boot process; Detecting the wireless card using iwconfig; Configuring the wireless card; Wireless card modes</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Protocol analysis with the network cardSummary; Chapter 3: Surveying Your Wireless Zone; Exploring devices; Working with tools; Using Kismet for access point discovery; Discovering hidden access points; Summary; Chapter 4: Breaching Wireless Security; Different types of attacks; Cracking WEP and WPA; Performing an attack using WEP and ChopChop; Summary; Chapter 5: Securing Your Wireless Network; Configuring initial wireless security; Defending from surveillance; Configuring encryption; Settings that provide protection from masquerade and rogue AP attacks; Summary; Appendix: Wireless Tools</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. All you need is some experience with networks and computers and you will be ready to go</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems / Security measures / Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029187693</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=604062</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=604062</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043776633 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:48Z |
institution | BVB |
isbn | 9781782164074 1782164073 1782164065 9781782164067 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029187693 |
oclc_num | 852756685 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 108 pages |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Cardwell, Kevin active 2001 Verfasser aut BackTrack Testing Wireless Network Security Birmingham Packt Publishing 2013 108 pages txt rdacontent c rdamedia cr rdacarrier Community experience distilled Includes index Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing and Configuring BackTrack; Downloading and configuring BackTrack; Installing BackTrack; Updating BackTrack; Validating the interfaces; Customizing Gnome; New wave theme; Creating a virtual machine; Summary; Chapter 2: Working with the Wireless Card; Checking card compatibility; Detecting the wireless card during the boot process; Detecting the wireless card using iwconfig; Configuring the wireless card; Wireless card modes Protocol analysis with the network cardSummary; Chapter 3: Surveying Your Wireless Zone; Exploring devices; Working with tools; Using Kismet for access point discovery; Discovering hidden access points; Summary; Chapter 4: Breaching Wireless Security; Different types of attacks; Cracking WEP and WPA; Performing an attack using WEP and ChopChop; Summary; Chapter 5: Securing Your Wireless Network; Configuring initial wireless security; Defending from surveillance; Configuring encryption; Settings that provide protection from masquerade and rogue AP attacks; Summary; Appendix: Wireless Tools Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. All you need is some experience with networks and computers and you will be ready to go Wireless communication systems / Security measures / Testing Computer networks / Security measures / Testing Open source software TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Wireless communication systems Security measures Testing Computer networks Security measures Testing |
spellingShingle | Cardwell, Kevin active 2001 BackTrack Testing Wireless Network Security Wireless communication systems / Security measures / Testing Computer networks / Security measures / Testing Open source software TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Wireless communication systems Security measures Testing Computer networks Security measures Testing |
title | BackTrack Testing Wireless Network Security |
title_auth | BackTrack Testing Wireless Network Security |
title_exact_search | BackTrack Testing Wireless Network Security |
title_full | BackTrack Testing Wireless Network Security |
title_fullStr | BackTrack Testing Wireless Network Security |
title_full_unstemmed | BackTrack Testing Wireless Network Security |
title_short | BackTrack |
title_sort | backtrack testing wireless network security |
title_sub | Testing Wireless Network Security |
topic | Wireless communication systems / Security measures / Testing Computer networks / Security measures / Testing Open source software TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Wireless communication systems Security measures Testing Computer networks Security measures Testing |
topic_facet | Wireless communication systems / Security measures / Testing Computer networks / Security measures / Testing Open source software TECHNOLOGY & ENGINEERING / Telecommunications Wireless communication systems Security measures Testing Computer networks Security measures Testing |
work_keys_str_mv | AT cardwellkevin backtracktestingwirelessnetworksecurity |