Hack proofing your wireless network:
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front o...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress Pub.
© 2002
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource (xxviii, 483 pages) illustrations |
ISBN: | 1932266178 9781932266177 9781928994596 1928994598 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124612 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2002 |||| o||u| ||||||eng d | ||
020 | |a 1932266178 |9 1-932266-17-8 | ||
020 | |a 9781932266177 |9 978-1-932266-17-7 | ||
020 | |a 9781928994596 |9 978-1-928994-59-6 | ||
020 | |a 1928994598 |9 1-928994-59-8 | ||
035 | |a (ZDB-33-ESD)ocm51674307 | ||
035 | |a (OCoLC)51674307 | ||
035 | |a (DE-599)BVBBV046124612 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 21 | |
100 | 1 | |a Barnes, Christian |e Verfasser |4 aut | |
245 | 1 | 0 | |a Hack proofing your wireless network |c Christian Barnes [and others] ; Neal O'Farrell, technical editor |
264 | 1 | |a Rockland, MA |b Syngress Pub. |c © 2002 | |
300 | |a 1 online resource (xxviii, 483 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at | ||
630 | 0 | 7 | |a IEEE 802 |n 11 |0 (DE-588)4633968-1 |2 gnd |9 rswk-swf |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 7 | |a Wireless LANs / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Wireless LANs |x Security measures | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Drahtloses lokales Netz |0 (DE-588)4633975-9 |D s |
689 | 0 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a IEEE 802 |n 11 |0 (DE-588)4633968-1 |D u |
689 | 1 | 1 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 1 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a O'Farrell, Neal |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781928994596 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505066 | ||
347 | |a text file |b PDF |2 rda | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781928994596 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180442812776448 |
---|---|
any_adam_object | |
author | Barnes, Christian |
author_facet | Barnes, Christian |
author_role | aut |
author_sort | Barnes, Christian |
author_variant | c b cb |
building | Verbundindex |
bvnumber | BV046124612 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocm51674307 (OCoLC)51674307 (DE-599)BVBBV046124612 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03491nmm a2200697zc 4500</leader><controlfield tag="001">BV046124612</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2002 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266178</subfield><subfield code="9">1-932266-17-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266177</subfield><subfield code="9">978-1-932266-17-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781928994596</subfield><subfield code="9">978-1-928994-59-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1928994598</subfield><subfield code="9">1-928994-59-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocm51674307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)51674307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124612</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Barnes, Christian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hack proofing your wireless network</subfield><subfield code="c">Christian Barnes [and others] ; Neal O'Farrell, technical editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 483 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">IEEE 802</subfield><subfield code="n">11</subfield><subfield code="0">(DE-588)4633968-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless LANs / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless LANs</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Drahtloses lokales Netz</subfield><subfield code="0">(DE-588)4633975-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">IEEE 802</subfield><subfield code="n">11</subfield><subfield code="0">(DE-588)4633968-1</subfield><subfield code="D">u</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Farrell, Neal</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781928994596</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505066</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781928994596</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124612 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 1932266178 9781932266177 9781928994596 1928994598 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505066 |
oclc_num | 51674307 |
open_access_boolean | |
physical | 1 online resource (xxviii, 483 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Barnes, Christian Verfasser aut Hack proofing your wireless network Christian Barnes [and others] ; Neal O'Farrell, technical editor Rockland, MA Syngress Pub. © 2002 1 online resource (xxviii, 483 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at IEEE 802 11 (DE-588)4633968-1 gnd rswk-swf COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Computer networks Security measures Wireless communication systems Security measures Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf Drahtloses lokales Netz (DE-588)4633975-9 s Hacker (DE-588)4113821-1 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 IEEE 802 11 (DE-588)4633968-1 u 2\p DE-604 O'Farrell, Neal Sonstige oth http://www.sciencedirect.com/science/book/9781928994596 Verlag URL des Erstveröffentlichers Volltext text file PDF rda 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Barnes, Christian Hack proofing your wireless network IEEE 802 11 (DE-588)4633968-1 gnd COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Computer networks Security measures Wireless communication systems Security measures Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)4633968-1 (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4633975-9 (DE-588)4113821-1 |
title | Hack proofing your wireless network |
title_auth | Hack proofing your wireless network |
title_exact_search | Hack proofing your wireless network |
title_full | Hack proofing your wireless network Christian Barnes [and others] ; Neal O'Farrell, technical editor |
title_fullStr | Hack proofing your wireless network Christian Barnes [and others] ; Neal O'Farrell, technical editor |
title_full_unstemmed | Hack proofing your wireless network Christian Barnes [and others] ; Neal O'Farrell, technical editor |
title_short | Hack proofing your wireless network |
title_sort | hack proofing your wireless network |
topic | IEEE 802 11 (DE-588)4633968-1 gnd COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless LANs / Security measures fast Computer networks Security measures Wireless communication systems Security measures Wireless LANs Security measures Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Drahtloses lokales Netz (DE-588)4633975-9 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | IEEE 802 11 COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Wireless communication systems / Security measures Wireless LANs / Security measures Computer networks Security measures Wireless communication systems Security measures Wireless LANs Security measures Computersicherheit Datensicherung Drahtloses lokales Netz Hacker |
url | http://www.sciencedirect.com/science/book/9781928994596 |
work_keys_str_mv | AT barneschristian hackproofingyourwirelessnetwork AT ofarrellneal hackproofingyourwirelessnetwork |