爱生活,爱IT
全部博文(436)
分类: 网络与安全
2010-10-22 12:37:00
《Seven Deadliest Wireless Technologies Attacks》
参考译名:《七种致命的无线技术攻击》
在这本书中包括详细的攻击包括:
802.11 Wireless-Infrastructure Attacks 802.11 无线基础设施的攻击 ;
802.11 Wireless-Client Attacks 802.11 无线客户端的攻击
Bluetooth Attacks 蓝牙攻击 ;
RFID Attacks RFID 的攻击 ;
Analog Wireless Device Attacks 模拟无线设备攻击 ;
Bad Encryption 坏加密 ;
Attacks on Cell Phones, PDAs and Other Hybrid Devices 攻击手机,PDA和其他混合设备 ;
全书下载地址:
"Seven Deadliest Wireless Technologies Attacks covers an array of wireless technologies and discusses the vulnerabilities and attacks associated with them, allowing the reader to fully understand not only HOW an attack works but WHY it works, using real-world examples supported by theory. This book is perfect for both penetration testers assessing these technologies and security managers who are tasked with managing the risks associated with them."--Tom Neaves, Senior Security Consultant at Verizon Business and Ph.D. Researcher at Royal Holloway, University of London
"I really, really liked this book. The chapters and the book are relatively short, but they are extremely to the point. The author has refrained from using overly technical language, and this fact makes this book perfect for novices and people who are forced to assume technical roles at home or at work. What I espeically liked is the large amount of real-world examples-they drive the point home and make for an interesting read. The text is peppered with notes, warnings and tips, and very enlightening 'Epic Fail' text boxes, where you can learn from other people's and companies' mistakes."--Help Net Security, October 04, 2010
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include: