Seven Deadliest Wireless Technologies Attacks book cover

Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Audience

Information security professionals of all levels; wireless device developers; recreational hackers

Paperback, 160 Pages

Published: March 2010

Imprint: Syngress

ISBN: 978-1-59749-541-7

Reviews

  • "Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them."--Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London

    "I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples-they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010


Contents

  • Introduction
    Chapter 1: 802.11 Wireless-Infrastructure Attacks
    Chapter 2: Wireless-Client Attacks
    Chapter 3: Bluetooth Attacks
    Chapter 4: Radio Frequency Identification Attacks
    Chapter 5: Analog Wireless Devices
    Chapter 6: Bad Encryption
    Chapter 7: Cell Phones, Personal Digital Assistants, and Other Hybrid Devices

Advertisement

advert image