We recommend using a modern web browser such as Google Chrome or Microsoft Edge with their default settings.
READING ON THE GO AT UNION STATION LENDING LIBRARY
In the spring of 2015, The Union Station Redevelopment Corporation launched a […]
Hello, I'm an eBook!
ATTENTION: This item is an eBook. It can be read on iOS, Android, MAC and PC's with a supported eReader. It is not a physical book. eBooks are available via download immediately after you've checked out.
Used Very Good
May ship separately
Converts one physical book into a digital version.
eDelivery converts your used book order into a digital version readable on most devices.
Ships directly from Better World Books
Ships separately from Better World Books suppliers
Borgasorus Books, Inc.
NaGar Book Store
jersey shore books
One Stop Shop Bookstore
Ambis Enterprises LLC
Super Book Deals
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, "Hacking Exposed Wireless," second edition reveals how attackers use readily available and custom tools to target, infiltrate, and hijack vulnerable systems. This book discusses the latest developments in Wi-Fi, Bluetooth, ZigBee, and DECT hacking, and explains how to perform penetration tests, reinforce WPA protection schemes, mitigate packet injection risk, and lock down Bluetooth and RF devices. Cutting-edge techniques for exploiting Wi-Fi clients, WPA2, cordless phones, Bluetooth pairing, and ZigBee encryption are also covered in this fully revised guide. Build and configure your Wi-Fi attack arsenal with the best hardware and software tools Explore common weaknesses in WPA2 networks through the eyes of an attacker Leverage post-compromise remote client attacks on Windows 7 and Mac OS X Master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark Evaluate your threat to software update impersonation attacks on public networks Assess your threat to eavesdropping attacks on Wi-Fi, Bluetooth, ZigBee, and DECT networks using commercial and custom tools Develop advanced skills leveraging Software Defined Radio and other flexible frameworks Apply comprehensive defenses to protect your wireless devices and infrastructure
Come shop our entire inventory of used books. Get discount code »
Gift Certificate = Happy Friend + Books donated to families in need. Make Someone Happy »
We match every book you purchase with a book donation. Learn more »
Sign up now to get news, sales and special promotions!
© Better World Books (BetterWorldBooks.com)