Mastering wireless penetration testing for highly secured environments: scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, England
Packt Publishing
2015
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Includes index Online resource; title from PDF title page (ebrary, viewed February 6, 2015) |
Beschreibung: | 1 online resource (220 pages) |
ISBN: | 9781782163190 1782163190 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045351092 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781782163190 |9 978-1-78216-319-0 | ||
020 | |a 1782163190 |9 1-78216-319-0 | ||
035 | |a (ZDB-4-ITC)ocn903967071 | ||
035 | |a (OCoLC)903967071 | ||
035 | |a (DE-599)BVBBV045351092 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.82 |2 23 | |
100 | 1 | |a Johns, A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mastering wireless penetration testing for highly secured environments |b scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |c Aaron Johns |
264 | 1 | |a Birmingham, England |b Packt Publishing |c 2015 | |
264 | 4 | |c 2015 | |
300 | |a 1 online resource (220 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Includes index | ||
500 | |a Online resource; title from PDF title page (ebrary, viewed February 6, 2015) | ||
505 | 8 | |a This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 4 | |a Computers |x Access control |a Penetration testing (Computer security) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Johns, Aaron |t Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |d Birmingham, England : Packt Publishing, 2015 |h v, 201 pages |k Community experience distilled |z 9781782163183 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737745 |
Datensatz im Suchindex
_version_ | 1804179176244117504 |
---|---|
any_adam_object | |
author | Johns, A. |
author_facet | Johns, A. |
author_role | aut |
author_sort | Johns, A. |
author_variant | a j aj |
building | Verbundindex |
bvnumber | BV045351092 |
collection | ZDB-4-ITC |
contents | This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking |
ctrlnum | (ZDB-4-ITC)ocn903967071 (OCoLC)903967071 (DE-599)BVBBV045351092 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02046nmm a2200409zc 4500</leader><controlfield tag="001">BV045351092</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163190</subfield><subfield code="9">978-1-78216-319-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163190</subfield><subfield code="9">1-78216-319-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn903967071</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)903967071</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045351092</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Johns, A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering wireless penetration testing for highly secured environments</subfield><subfield code="b">scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals</subfield><subfield code="c">Aaron Johns</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, England</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (220 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (ebrary, viewed February 6, 2015)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Johns, Aaron</subfield><subfield code="t">Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals</subfield><subfield code="d">Birmingham, England : Packt Publishing, 2015</subfield><subfield code="h">v, 201 pages</subfield><subfield code="k">Community experience distilled</subfield><subfield code="z">9781782163183</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737745</subfield></datafield></record></collection> |
id | DE-604.BV045351092 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:42Z |
institution | BVB |
isbn | 9781782163190 1782163190 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737745 |
oclc_num | 903967071 |
open_access_boolean | |
physical | 1 online resource (220 pages) |
psigel | ZDB-4-ITC |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Johns, A. Verfasser aut Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns Birmingham, England Packt Publishing 2015 2015 1 online resource (220 pages) txt rdacontent c rdamedia cr rdacarrier Community experience distilled Includes index Online resource; title from PDF title page (ebrary, viewed February 6, 2015) This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) Erscheint auch als Druck-Ausgabe Johns, Aaron Mastering wireless penetration testing for highly secured environments : scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Birmingham, England : Packt Publishing, 2015 v, 201 pages Community experience distilled 9781782163183 |
spellingShingle | Johns, A. Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals This book is intended for security professionals who want to enhance their wireless penetration testing skills and knowledge. Since this book covers advanced techniques, you will need some previous experience in computer security and networking COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) |
title | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |
title_auth | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |
title_exact_search | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |
title_full | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns |
title_fullStr | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns |
title_full_unstemmed | Mastering wireless penetration testing for highly secured environments scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals Aaron Johns |
title_short | Mastering wireless penetration testing for highly secured environments |
title_sort | mastering wireless penetration testing for highly secured environments scan exploit and crack wireless networks by using the most advanced techniques from security professionals |
title_sub | scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals |
topic | COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) |
topic_facet | COMPUTERS / Security / General Computers / Access control Penetration testing (Computer security) Computers Access control Penetration testing (Computer security) |
work_keys_str_mv | AT johnsa masteringwirelesspenetrationtestingforhighlysecuredenvironmentsscanexploitandcrackwirelessnetworksbyusingthemostadvancedtechniquesfromsecurityprofessionals |