Descargar Wardriving: Drive, Detect, Defend (a Guide to Wireless Security) en PDF de Vv.Aa

Descargar Wardriving: Drive, Detect, Defend (a Guide to Wireless Security) en PDF de Vv.Aa año 2004

Ficha completa del libro

 

  • Nombre del libro: Wardriving: Drive, Detect, Defend (a Guide to Wireless Security)
  • Autor del libroVv.Aa
  • Fecha de publicación: 3/8/2004
  • EditorialSYNGRESS
  • Páginas del PDF: 512
  • IdiomaInglés
  • Incluye un resumen PDF de 42 páginas
  • ISBN: 9781931836036
  • Encuadernación: Tapa Dura
  • Género o ColecciónInformática
  • Valoración del libro: 4.68 de un máximo de 5
  • Votos: 115 
  • Descripción o resumen: Chris Hurley, Michael Puchol The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. Wireless networks have become a way of life in the past two years. As more wireless networks are deployed the need to secure them increases. This book educates users of wireless networks as well as those who run the networks about the insecurities associated with wireless networking. This effort is called WarDriving. In order to successfully WarDrive there are hardware and software tool required. This book covers those tools, along with cost estimates and recommendations. Since there are hundreds of possible configurations that can be used for WarDriving, some of the most popular are presented to help readers decide what to buy for their own WarDriving setup. Many of the tools that a WarDriver uses are the same tools that could be used by an attacker to gain unauthorized access to a wireless network. Since this is not the goal of a WarDriver, the methodology that users can use to ethically WarDrive is presented. In addition, complete coverage of WarDriving applications, such as NetStumbler, MiniStumbler; and Kismet, are covered.
  • Otros formatos de descarga disponibles: TXT - DOC - WORD - EPUB - PDF. Compresión disponible JAR - Z - ZIP - RAR
  • Servidores habilitados: Google Drive - MEGA - Torrent - MyUpload - Dropbox - Mediafire - 4Shared

 

Autor de la reseña

 

  • Subido por: César Barrio
  • Fecha: 12/6/2018
  • Valorado con una puntuación de 4.79 de un máximo de 5
Option 1

Option 2

Option 3

Option 4

Option 5
Votar:

Otros libros del autor Vv.Aa

Otros libros de la editorial SYNGRESS

Otros libros del género o colección Informática

Otros libros en el idioma Inglés