Hacking wireless access points: cracking, tracking, and signal jacking
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology co...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, MA
Syngress
[2017]
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xv, 155 pages) illustrations |
ISBN: | 9780128092255 0128092254 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045131199 | ||
003 | DE-604 | ||
005 | 20210112 | ||
007 | cr|uuu---uuuuu | ||
008 | 180814s2017 |||| o||u| ||||||eng d | ||
020 | |a 9780128092255 |9 978-0-12-809225-5 | ||
020 | |a 0128092254 |9 0-12-809225-4 | ||
035 | |a (ZDB-33-ESD)ocn967226322 | ||
035 | |a (OCoLC)967226322 | ||
035 | |a (DE-599)BVBBV045131199 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-860 | ||
082 | 0 | |a 004.68 |2 23 | |
100 | 1 | |a Kurtz, Jennifer Ann |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hacking wireless access points |b cracking, tracking, and signal jacking |c Jennifer Ann Kurtz, Richard Kaczmarek, technical editor |
264 | 1 | |a Cambridge, MA |b Syngress |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a 1 online resource (xv, 155 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology | ||
650 | 7 | |a COMPUTERS / Computer Literacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Computer Science |2 bisacsh | |
650 | 7 | |a COMPUTERS / Data Processing |2 bisacsh | |
650 | 7 | |a COMPUTERS / Hardware / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Information Technology |2 bisacsh | |
650 | 7 | |a COMPUTERS / Machine Theory |2 bisacsh | |
650 | 7 | |a COMPUTERS / Reference |2 bisacsh | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kaczmarek, Richard |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780128053157 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 0128053151 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128053157 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030521194 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128053157 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178790488735744 |
---|---|
any_adam_object | |
author | Kurtz, Jennifer Ann |
author_facet | Kurtz, Jennifer Ann |
author_role | aut |
author_sort | Kurtz, Jennifer Ann |
author_variant | j a k ja jak |
building | Verbundindex |
bvnumber | BV045131199 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn967226322 (OCoLC)967226322 (DE-599)BVBBV045131199 |
dewey-full | 004.68 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.68 |
dewey-search | 004.68 |
dewey-sort | 14.68 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03114nmm a2200577zc 4500</leader><controlfield tag="001">BV045131199</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210112 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180814s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128092255</subfield><subfield code="9">978-0-12-809225-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128092254</subfield><subfield code="9">0-12-809225-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn967226322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)967226322</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045131199</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.68</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurtz, Jennifer Ann</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking wireless access points</subfield><subfield code="b">cracking, tracking, and signal jacking</subfield><subfield code="c">Jennifer Ann Kurtz, Richard Kaczmarek, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xv, 155 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Literacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Computer Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Data Processing</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Hardware / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Information Technology</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Machine Theory</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Reference</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kaczmarek, Richard</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780128053157</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">0128053151</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128053157</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030521194</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128053157</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045131199 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:09:34Z |
institution | BVB |
isbn | 9780128092255 0128092254 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030521194 |
oclc_num | 967226322 |
open_access_boolean | |
owner | DE-860 |
owner_facet | DE-860 |
physical | 1 online resource (xv, 155 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FLA_PDA_ESD_Kauf |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Syngress |
record_format | marc |
spelling | Kurtz, Jennifer Ann Verfasser aut Hacking wireless access points cracking, tracking, and signal jacking Jennifer Ann Kurtz, Richard Kaczmarek, technical editor Cambridge, MA Syngress [2017] © 2017 1 online resource (xv, 155 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Kaczmarek, Richard Sonstige oth Erscheint auch als Druck-Ausgabe 9780128053157 Erscheint auch als Druck-Ausgabe 0128053151 http://www.sciencedirect.com/science/book/9780128053157 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kurtz, Jennifer Ann Hacking wireless access points cracking, tracking, and signal jacking COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4633975-9 |
title | Hacking wireless access points cracking, tracking, and signal jacking |
title_auth | Hacking wireless access points cracking, tracking, and signal jacking |
title_exact_search | Hacking wireless access points cracking, tracking, and signal jacking |
title_full | Hacking wireless access points cracking, tracking, and signal jacking Jennifer Ann Kurtz, Richard Kaczmarek, technical editor |
title_fullStr | Hacking wireless access points cracking, tracking, and signal jacking Jennifer Ann Kurtz, Richard Kaczmarek, technical editor |
title_full_unstemmed | Hacking wireless access points cracking, tracking, and signal jacking Jennifer Ann Kurtz, Richard Kaczmarek, technical editor |
title_short | Hacking wireless access points |
title_sort | hacking wireless access points cracking tracking and signal jacking |
title_sub | cracking, tracking, and signal jacking |
topic | COMPUTERS / Computer Literacy bisacsh COMPUTERS / Computer Science bisacsh COMPUTERS / Data Processing bisacsh COMPUTERS / Hardware / General bisacsh COMPUTERS / Information Technology bisacsh COMPUTERS / Machine Theory bisacsh COMPUTERS / Reference bisacsh Wireless LANs / Security measures fast Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd |
topic_facet | COMPUTERS / Computer Literacy COMPUTERS / Computer Science COMPUTERS / Data Processing COMPUTERS / Hardware / General COMPUTERS / Information Technology COMPUTERS / Machine Theory COMPUTERS / Reference Wireless LANs / Security measures Wireless LANs Security measures Computersicherheit Drahtloses lokales Netz |
url | http://www.sciencedirect.com/science/book/9780128053157 |
work_keys_str_mv | AT kurtzjenniferann hackingwirelessaccesspointscrackingtrackingandsignaljacking AT kaczmarekrichard hackingwirelessaccesspointscrackingtrackingandsignaljacking |