Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
EUR 6,44
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: As New. No Jacket. Pages are clean and are not marred by notes or folds of any kind. ~ ThriftBooks: Read More, Spend Less 0.1.
Anbieter: ThriftBooks-Atlanta, AUSTELL, GA, USA
EUR 6,44
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 0.1.
Anbieter: ThriftBooks-Dallas, Dallas, TX, USA
EUR 6,44
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less 0.1.
EUR 6,25
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.44.
EUR 6,25
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less 0.44.
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
Erstausgabe
EUR 8,87
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. 1st Edition. Ships from the UK. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
EUR 6,15
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Anbieter: Better World Books, Mishawaka, IN, USA
Erstausgabe
EUR 6,15
Währung umrechnenAnzahl: 3 verfügbar
In den WarenkorbZustand: Good. 1st Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
EUR 37,32
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Practical, hands-on instruction for securing wireless networks--from the Secure Beginner s Guide seriesPractical, hands-on instruction for securing wireless networks--from the Secure Beginner s Guide seriesSecurity Smarts for the Self-Guided IT Prof.
EUR 47,56
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates forauthentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wirelesssolutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.Wireless Network Security: A Beginner's Guide features:Lingo--Common security terms defined so that you'rein the know on the jobIMHO--Frank and relevant opinions based on theauthor's years of industry experienceIn Actual Practice--Exceptions to the rules of securityexplained in real-world contextsYour Plan--Customizable checklists you can use onthe job nowInto Action--Tips on how, why, and when to applynew skills and techniques at workThis is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what 'wireless security' is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012).
EUR 45,52
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Used. pp. xvii + 347.
Verlag: McGraw-Hill Professional|McGraw-Hill Osborne, 2015
ISBN 10: 0071828362 ISBN 13: 9780071828369
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 49,88
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New. Preventive strategies for deterring today s most malicious and least understood risks to enterprise securityPreventive strategies for deterring today s most malicious and least understood risks to enterprise securityMaster the tactics and tools of t.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 65,78
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware - Master the tactics and tools of the advanced persistent threat hackerIn this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations vulnerable and provides noteworthy empirical evidence. You'll learn a proven APT Hacker Methodology for systematically targeting and infiltrating an organization and its IT systems. A unique, five-phased tactical approach to APT hacking is presented with real-world examples and hands-on techniques you can use immediately to execute very effective attacks.Review empirical data from actual attacks conducted byunsophisticated and elite APT hackers alikeLearn the APT Hacker Methodology--a systematic approach designed to ensure success, avoid failures, and minimize the risk of being caughtPerform in-depth reconnaissance to build a comprehensive understanding of the targetObtain non-technical data about the target, including open source, human, financial, and geographical intelligenceUse social engineering to compromise a specific system, application, or workstationIdentify and attack wireless networks and wireless client devicesSpearphish with hardware-based Trojan devicesPhysically infiltrate target facilities to obtain access to assets and compromise digital lily pads.