Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Hacking exposed. Wireless : wireless security secrets & solutions
by
Wright, Joshua, author
, Cache, Johnny, author
in
Wireless communication systems Security measures.
/ Wireless LANs Security measures.
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Hacking exposed. Wireless : wireless security secrets & solutions
by
Wright, Joshua, author
, Cache, Johnny, author
in
Wireless communication systems Security measures.
/ Wireless LANs Security measures.
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Hacking exposed. Wireless : wireless security secrets & solutions
Book
Hacking exposed. Wireless : wireless security secrets & solutions
Available to read in the library!
Request Book From Autostore
and Choose the Collection Method
Overview
Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. This book features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave.
Publisher
McGraw-Hill Education
ISBN
9780071827638, 0071827633
Item info:
1
item available
1
item total in all locations
| Call Number | Copies | Material | Location |
|---|---|---|---|
| TK5103.2.W77 2015 | 1 | BOOK | AUTOSTORE |
This website uses cookies to ensure you get the best experience on our website.