Kismet hacking:
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Ki...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress Pub.
© 2008
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive |
Beschreibung: | Includes index Includes bibliographical references and index |
Beschreibung: | 1 online resource (xi, 258 pages) illustrations |
ISBN: | 9781597491174 1597491179 9780080558707 0080558704 1282768956 9781282768956 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046124775 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2008 |||| o||u| ||||||eng d | ||
020 | |a 9781597491174 |9 978-1-59749-117-4 | ||
020 | |a 1597491179 |9 1-59749-117-9 | ||
020 | |a 9780080558707 |9 978-0-08-055870-7 | ||
020 | |a 0080558704 |9 0-08-055870-4 | ||
020 | |a 1282768956 |9 1-282-76895-6 | ||
020 | |a 9781282768956 |9 978-1-282-76895-6 | ||
035 | |a (ZDB-33-ESD)ocn272383149 | ||
035 | |a (OCoLC)272383149 | ||
035 | |a (DE-599)BVBBV046124775 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Haines, Brad |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kismet hacking |c Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
264 | 1 | |a Burlington, MA |b Syngress Pub. |c © 2008 | |
300 | |a 1 online resource (xi, 258 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive | ||
630 | 0 | 4 | |a Kismet (Electronic resource) |
650 | 7 | |a Kismet (Electronic resource) |2 blmlsh | |
650 | 7 | |a Kismet (Electronic resource) |2 fast | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Radio |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Wireless communication systems |x Security measures | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Schearer, Michael J. |e Sonstige |4 oth | |
700 | 1 | |a Thornton, Frank |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491174 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505229 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597491174 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443149369344 |
---|---|
any_adam_object | |
author | Haines, Brad |
author_facet | Haines, Brad |
author_role | aut |
author_sort | Haines, Brad |
author_variant | b h bh |
building | Verbundindex |
bvnumber | BV046124775 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn272383149 (OCoLC)272383149 (DE-599)BVBBV046124775 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02920nmm a2200529zc 4500</leader><controlfield tag="001">BV046124775</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491174</subfield><subfield code="9">978-1-59749-117-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491179</subfield><subfield code="9">1-59749-117-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080558707</subfield><subfield code="9">978-0-08-055870-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080558704</subfield><subfield code="9">0-08-055870-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282768956</subfield><subfield code="9">1-282-76895-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282768956</subfield><subfield code="9">978-1-282-76895-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn272383149</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)272383149</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046124775</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Haines, Brad</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kismet hacking</subfield><subfield code="c">Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress Pub.</subfield><subfield code="c">© 2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 258 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Kismet (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kismet (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kismet (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Radio</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schearer, Michael J.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thornton, Frank</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491174</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505229</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597491174</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046124775 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:50Z |
institution | BVB |
isbn | 9781597491174 1597491179 9780080558707 0080558704 1282768956 9781282768956 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505229 |
oclc_num | 272383149 |
open_access_boolean | |
physical | 1 online resource (xi, 258 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Syngress Pub. |
record_format | marc |
spelling | Haines, Brad Verfasser aut Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton Burlington, MA Syngress Pub. © 2008 1 online resource (xi, 258 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Includes bibliographical references and index Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. *Wardrive Running Kismet from the BackTrack Live CD *Build and Integrate Drones with your Kismet Server *Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive Kismet (Electronic resource) Kismet (Electronic resource) blmlsh Kismet (Electronic resource) fast TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures Schearer, Michael J. Sonstige oth Thornton, Frank Sonstige oth http://www.sciencedirect.com/science/book/9781597491174 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Haines, Brad Kismet hacking Kismet (Electronic resource) Kismet (Electronic resource) blmlsh Kismet (Electronic resource) fast TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures |
title | Kismet hacking |
title_auth | Kismet hacking |
title_exact_search | Kismet hacking |
title_full | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_fullStr | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_full_unstemmed | Kismet hacking Brad "RenderMan" Haines, Michael J. Schearer, Frank Thornton |
title_short | Kismet hacking |
title_sort | kismet hacking |
topic | Kismet (Electronic resource) Kismet (Electronic resource) blmlsh Kismet (Electronic resource) fast TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Wireless communication systems Security measures Computer networks Security measures |
topic_facet | Kismet (Electronic resource) TECHNOLOGY & ENGINEERING / Radio TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications Computer networks / Security measures Wireless communication systems / Security measures Wireless communication systems Security measures Computer networks Security measures |
url | http://www.sciencedirect.com/science/book/9781597491174 |
work_keys_str_mv | AT hainesbrad kismethacking AT schearermichaelj kismethacking AT thorntonfrank kismethacking |