WarDriving: drive, detect, defend : a guide to wireless security
The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless a...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. [Sebastopol, Calif.]
Syngress Distributed by O'Reilly
© 2004
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide |
Beschreibung: | "WarDriving is the act of moving around a specific area and mapping the population of wireless access points for statistical purposes ... to raise awareness of the security problems associated with these networks"--Page 3. - Includes index Includes bibliographical references and index Paralleltitel: WarDriving and wireless security |
Beschreibung: | 1 online resource (xxiii, 495 pages) illustrations |
ISBN: | 9780080481685 008048168X 1931836213 9781931836210 9781931836036 1931836035 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124528 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2004 |||| o||u| ||||||eng d | ||
020 | |a 9780080481685 |9 978-0-08-048168-5 | ||
020 | |a 008048168X |9 0-08-048168-X | ||
020 | |a 1931836213 |9 1-931836-21-3 | ||
020 | |a 9781931836210 |9 978-1-931836-21-0 | ||
020 | |a 9781931836036 |9 978-1-931836-03-6 | ||
020 | |a 1931836035 |9 1-931836-03-5 | ||
035 | |a (ZDB-33-ESD)ocn179515211 | ||
035 | |a (OCoLC)179515211 | ||
035 | |a (DE-599)BVBBV046124528 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a WarDriving |b drive, detect, defend : a guide to wireless security |c Chris Hurley ... [et al. ; foreword by Jeff Moss] |
246 | 1 | 3 | |a Drive, detect, defend |
246 | 1 | 3 | |a Guide to wireless security |
246 | 1 | 3 | |a WarDriving and wireless security |
264 | 1 | |a Rockland, Mass. |a [Sebastopol, Calif.] |b Syngress |b Distributed by O'Reilly |c © 2004 | |
300 | |a 1 online resource (xxiii, 495 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "WarDriving is the act of moving around a specific area and mapping the population of wireless access points for statistical purposes ... to raise awareness of the security problems associated with these networks"--Page 3. - Includes index | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Paralleltitel: WarDriving and wireless security | ||
520 | |a The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a WarDriving |0 (DE-588)4801049-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a WarDriving |0 (DE-588)4801049-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Hurley, Chris |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781931836036 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031504982 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781931836036 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442640809984 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046124528 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn179515211 (OCoLC)179515211 (DE-599)BVBBV046124528 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02881nmm a2200577zc 4500</leader><controlfield tag="001">BV046124528</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2004 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080481685</subfield><subfield code="9">978-0-08-048168-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008048168X</subfield><subfield code="9">0-08-048168-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836213</subfield><subfield code="9">1-931836-21-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836210</subfield><subfield code="9">978-1-931836-21-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836036</subfield><subfield code="9">978-1-931836-03-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836035</subfield><subfield code="9">1-931836-03-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn179515211</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)179515211</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124528</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">WarDriving</subfield><subfield code="b">drive, detect, defend : a guide to wireless security</subfield><subfield code="c">Chris Hurley ... [et al. ; foreword by Jeff Moss]</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Drive, detect, defend</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Guide to wireless security</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">WarDriving and wireless security</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">[Sebastopol, Calif.]</subfield><subfield code="b">Syngress</subfield><subfield code="b">Distributed by O'Reilly</subfield><subfield code="c">© 2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiii, 495 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"WarDriving is the act of moving around a specific area and mapping the population of wireless access points for statistical purposes ... to raise awareness of the security problems associated with these networks"--Page 3. - Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Paralleltitel: WarDriving and wireless security</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">WarDriving</subfield><subfield code="0">(DE-588)4801049-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">WarDriving</subfield><subfield code="0">(DE-588)4801049-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hurley, Chris</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781931836036</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031504982</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781931836036</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124528 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9780080481685 008048168X 1931836213 9781931836210 9781931836036 1931836035 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031504982 |
oclc_num | 179515211 |
open_access_boolean | |
physical | 1 online resource (xxiii, 495 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress Distributed by O'Reilly |
record_format | marc |
spelling | WarDriving drive, detect, defend : a guide to wireless security Chris Hurley ... [et al. ; foreword by Jeff Moss] Drive, detect, defend Guide to wireless security WarDriving and wireless security Rockland, Mass. [Sebastopol, Calif.] Syngress Distributed by O'Reilly © 2004 1 online resource (xxiii, 495 pages) illustrations txt rdacontent c rdamedia cr rdacarrier "WarDriving is the act of moving around a specific area and mapping the population of wireless access points for statistical purposes ... to raise awareness of the security problems associated with these networks"--Page 3. - Includes index Includes bibliographical references and index Paralleltitel: WarDriving and wireless security The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer security WarDriving (DE-588)4801049-2 gnd rswk-swf WarDriving (DE-588)4801049-2 s 1\p DE-604 Hurley, Chris Sonstige oth http://www.sciencedirect.com/science/book/9781931836036 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | WarDriving drive, detect, defend : a guide to wireless security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer security WarDriving (DE-588)4801049-2 gnd |
subject_GND | (DE-588)4801049-2 |
title | WarDriving drive, detect, defend : a guide to wireless security |
title_alt | Drive, detect, defend Guide to wireless security WarDriving and wireless security |
title_auth | WarDriving drive, detect, defend : a guide to wireless security |
title_exact_search | WarDriving drive, detect, defend : a guide to wireless security |
title_full | WarDriving drive, detect, defend : a guide to wireless security Chris Hurley ... [et al. ; foreword by Jeff Moss] |
title_fullStr | WarDriving drive, detect, defend : a guide to wireless security Chris Hurley ... [et al. ; foreword by Jeff Moss] |
title_full_unstemmed | WarDriving drive, detect, defend : a guide to wireless security Chris Hurley ... [et al. ; foreword by Jeff Moss] |
title_short | WarDriving |
title_sort | wardriving drive detect defend a guide to wireless security |
title_sub | drive, detect, defend : a guide to wireless security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer security WarDriving (DE-588)4801049-2 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security Wireless communication systems / Security measures Wireless communication systems Security measures WarDriving |
url | http://www.sciencedirect.com/science/book/9781931836036 |
work_keys_str_mv | AT hurleychris wardrivingdrivedetectdefendaguidetowirelesssecurity AT hurleychris drivedetectdefend AT hurleychris guidetowirelesssecurity AT hurleychris wardrivingandwirelesssecurity |