LDR | | 03560cmm uu200565Mi 4500 |
001 | | 000000301652 |
003 | | OCoLC |
005 | | 20230519143538 |
006 | | m o d |
007 | | cr cnu---unuuu |
008 | | 130713s2013 enk o 001 0 eng d |
019 | |
▼a 857716874 |
020 | |
▼a 9781782164074 (electronic bk.) |
020 | |
▼a 1782164073 (electronic bk.) |
020 | |
▼z 9781782164067 |
029 | 1 |
▼a AU@
▼b 000052006893 |
035 | |
▼a (OCoLC)852756685 |
037 | |
▼a CL0500000277
▼b Safari Books Online |
040 | |
▼a EBLCP
▼b eng
▼e pn
▼c EBLCP
▼d N$T
▼d IDEBK
▼d UMI
▼d OCLCQ
▼d COO
▼d 248032 |
049 | |
▼a K4RA |
050 | 4 |
▼a TK5103.2 |
072 | 7 |
▼a TEC
▼x 041000
▼2 bisacsh |
082 | 04 |
▼a 621.382
▼2 23 |
100 | 1 |
▼a Cardwell, Kevin. |
245 | 10 |
▼a BackTrack
▼h [electronic resource] :
▼b Testing Wireless Network Security. |
260 | |
▼a Birmingham :
▼b Packt Publishing,
▼c 2013. |
300 | |
▼a 1 online resource (108 pages). |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
490 | 1 |
▼a Community experience distilled |
500 | |
▼a Includes index. |
505 | 0 |
▼a Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Installing and Configuring BackTrack; Downloading and configuring BackTrack; Installing BackTrack; Updating BackTrack; Validating the interfaces; Customizing Gnome; New wave theme; Creating a virtual machine; Summary; Chapter 2: Working with the Wireless Card; Checking card compatibility; Detecting the wireless card during the boot process; Detecting the wireless card using iwconfig; Configuring the wireless card; Wireless card modes. |
505 | 8 |
▼a Protocol analysis with the network cardSummary; Chapter 3: Surveying Your Wireless Zone; Exploring devices; Working with tools; Using Kismet for access point discovery; Discovering hidden access points; Summary; Chapter 4: Breaching Wireless Security; Different types of attacks; Cracking WEP and WPA; Performing an attack using WEP and ChopChop; Summary; Chapter 5: Securing Your Wireless Network; Configuring initial wireless security; Defending from surveillance; Configuring encryption; Settings that provide protection from masquerade and rogue AP attacks; Summary; Appendix: Wireless Tools. |
520 | |
▼a Written in an easy-to-follow step-by-step format, you will be able to get started in next to no time with minimal effort and zero fuss. BackTrack: Testing Wireless Network Security is for anyone who has an interest in security and who wants to know more about wireless networks. All you need is some experience with networks and computers and you will be ready to go. |
588 | |
▼a Description based on print version record. |
650 | 0 |
▼a Wireless communication systems
▼x Security measures
▼x Testing. |
650 | 0 |
▼a Computer networks
▼x Security measures
▼x Testing. |
650 | 0 |
▼a Open source software. |
650 | 7 |
▼a TECHNOLOGY & ENGINEERING
▼x Telecommunications.
▼2 bisacsh |
655 | 4 |
▼a Electronic books. |
655 | 0 |
▼a Electronic books. |
776 | 08 |
▼i Print version:
▼a Cardwell, Kevin.
▼t BackTrack : Testing Wireless Network Security.
▼d Birmingham : Packt Publishing, 짤2013
▼z 9781782164067 |
830 | 0 |
▼a Community experience distilled. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=604062 |
938 | |
▼a EBL - Ebook Library
▼b EBLB
▼n EBL1192679 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 604062 |
938 | |
▼a Ingram Digital eBook Collection
▼b IDEB
▼n cis26003396 |
990 | |
▼a 관리자 |
994 | |
▼a 92
▼b K4R |