HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

Hacking Wireless Networks For Dummies by…
Loading...

Hacking Wireless Networks For Dummies

by Kevin Beaver

MembersReviewsPopularityAverage ratingConversations
55None214,390 (2.5)None

None.

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

No reviews
no reviews | add a review

» Add other authors

Author nameRoleType of authorWork?Status
Kevin Beaverprimary authorall editionscalculated
Akin, Devin K.Forewordsecondary authorall editionsconfirmed
Davis, Peter T.secondary authorall editionsconfirmed
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
Dedication
Little G -- this one's for you. You're such a great motivator and inspiration to me -- more than words can say. Thanks for reminding me of what's really important. Thanks for being you. -- Kevin

To all my friends and enemies. Hopefully, the first group is bigger than the second. -- Peter
First words
[Foreword] In all of networking history, it has never been easier to penetrate a network.
Welcome to Hacking Wireless Networks For Dummies.
Quotations
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English (1)

Book description
Haiku summary

Amazon.com Product Description (ISBN 0764597302, Paperback)

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices

(retrieved from Amazon Thu, 12 Mar 2015 18:20:18 -0400)

No library descriptions found.

Quick Links

Swap Ebooks Audio
7 wanted

Popular covers

Rating

Average: (2.5)
0.5
1 1
1.5
2
2.5
3 3
3.5
4
4.5
5

Is this you?

Become a LibraryThing Author.

 

About | Contact | Privacy/Terms | Help/FAQs | Blog | Store | APIs | TinyCat | Legacy Libraries | Early Reviewers | Common Knowledge | 119,439,617 books! | Top bar: Always visible