Ebook Info
- Published: 2005
- Number of pages: 384 pages
- Format: PDF
- File Size: 8.79 MB
- Authors: Kevin Beaver
Description
Become a cyber-hero – know the common wireless weaknesses “Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.” –Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient – not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.Discover how to:Perform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices
User’s Reviews
Editorial Reviews: From the Inside Flap Become a cyber-hero — know the common wireless weaknesses “Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.” —Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient — not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.Discover how toPerform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices From the Back Cover Become a cyber-hero — know the common wireless weaknesses “Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional.” —Devin Akin – CTO, The Certified Wireless Network Professional (CWNP) ProgramWireless networks are so convenient — not only for you, but also for those nefarious types who’d like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network’s armor.Discover how toPerform ethical hacks without compromising a systemCombat denial of service and WEP attacksUnderstand how invaders thinkRecognize the effects of different hacksProtect against war drivers and rogue devices About the Author Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response. Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years. Read more
Reviews from Amazon users which were colected at the time this book was published on the website:
⭐I needed to round out my security knowledge with some basic understanding of how wifi networks are exploited and this is a fantastic book for just that. I don’t believe there is such a thing as a safe wifi network anymore. With enough time, just about any encryption key can be reverse engineered. It drastically changed my own home security profile, and taught me more than I needed to know about wifi security.
⭐Book came in excellent condition.
⭐This is the real specialty the authors of this book have mastered…I am astonished at how many positive reviews this horrible, stinky title has received … how many friends do this guys have? In fact this has got to be one of the worst tech book I have ever read, a total waste of money and paper.My advice is , avoid this book, and any other book form the same authors, like plague! You will learn NOTHING from them.The authors go on and on babbling about how unsecure wireless networks are, and are nonetheless unable to clearly indicate you any technique to take advantage or to protect form this weakness. All you get (apart from the boring and repetitive author’s ruminations) are a few screenshots of NetStumbler (hey man, I can see by myself what it looks like, teach me how to use it instead ..), one screenshot of Kismet running on a linux xterm and a list of some of its command options (come on do you think that a beginner would ever be able to figure out how to use a open source tool like Kismet all by himself?)Ah we also get a little advertisement for a couple of non-free tools like AiroPeek … like a beginner should spend money on that? And , wait, there is no tutorial or intro on those tools as well. Just the usual couple of screenshots to make the book look good if you flip through it at the bookstore.Seriously, I know this is hard to believe, but this pathetic excuse for a book is just a series of boring trivialitiesFor example … did you ever think about the fact that installing a non-authorized, non-encrypted access point in your office network might actually be a security risk? I am sure you didn’t, but thanks to this beautiful book you know, as the author spends pages and pages rambling and babbling about this absurd topic!Years ago the “For Dummies” series used to be the right choice if you needed a humorous, tutorial-like but solid intro to a ‘foreign’ technology, but now the title is not a joke anymore.”Hacking Wireless Networks for Dummies”.. true to its title!
⭐I must be the biggest dummy in the world, because I could not understand a word of it.
⭐NOT VERY HELPFUL
⭐good
⭐Valuable in my work as a consultant, installing and troubleshooting WiFi networks. The “ethical hacker” is a valuable tool.
⭐Enjoy doing business… Sells quality products…
⭐Interesting reading
⭐Wireless networks
⭐Good service will use again.
⭐JUST AS ADVERTISED
⭐great book and good seller
Keywords
Free Download Hacking Wireless Networks For Dummies 1st Edition in PDF format
Hacking Wireless Networks For Dummies 1st Edition PDF Free Download
Download Hacking Wireless Networks For Dummies 1st Edition 2005 PDF Free
Hacking Wireless Networks For Dummies 1st Edition 2005 PDF Free Download
Download Hacking Wireless Networks For Dummies 1st Edition PDF
Free Download Ebook Hacking Wireless Networks For Dummies 1st Edition