買這商品的人也買了...
-
$580$458 -
$823Simulation Modeling and Analysis, 3/e
-
$2,260$2,147 -
$970Introduction to Algorithms, 2/e
-
$380$300 -
$1,029Operating System Concepts, 6/e (Windows XP Update)
-
$420$328 -
$350$277 -
$590$466 -
$680$537 -
$680$537 -
$750$638 -
$2,390$2,271 -
$1,930$1,834 -
$720$612 -
$480$379 -
$750$593 -
$780$616 -
$3,070$2,917 -
$480$379 -
$780$616 -
$650$507 -
$880$748 -
$1,620$1,539 -
$490$392
商品描述
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.
The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.
The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.
Table of Contents
Introduction.
I. WIRELESS FUNDAMENTALS.
1. Wireless Hardware.
2. Wireless Network Protocols.
3. Wireless
Programming.
4. WEP Security.
II. WIRELESS THREATS.
5. Cracking WEP.
6. Hacking Techniques.
7. Wireless Attacks.
8. Airborne Viruses.
III. TOOLS OF THE TRADE.
9. Auditing Tools.
10. Pocket PC Hacking.
11. Wireless
Hack Walkthrough.
IV. WIRELESS SECURITY.
12. Securing the WLAN.
13. Virtual Private Networks.
14. Intrusion
Detection Systems.
15. Wireless Public Key Infrastructure.
V. APPENDIXES.
Appendix A: Decimal/Hex/Binary Conversion Table.
Appendix B: WEPCrack
Exploit Code Example.
Appendix C: References.
商品描述(中文翻譯)
《最大無線安全》是一本實用手冊,揭示了駭客用來侵入無線網路的技術和工具,並詳細說明了網路管理員需要採取的步驟來保護他們的系統。
作者提供了滿足專家對深入資訊需求的資料,包括實際的源代碼、真實案例研究和逐步配置食譜。
本書包含詳細的實作資訊,這些資訊在任何印刷文本中目前都無法獲得——這些資訊是從作者與真實無線駭客(「戰車駭客」)、無線安全開發者以及領先的安全專家合作中獲得的。
目錄
引言。
I. 無線基礎。
1. 無線硬體。
2. 無線網路協定。
3. 無線程式設計。
4. WEP安全。
II. 無線威脅。
5. 破解WEP。
6. 駭客技術。
7. 無線攻擊。
8. 空中病毒。
III. 行業工具。
9. 審計工具。
10. 掌中寶駭客。
11. 無線駭客步驟指南。
IV. 無線安全。
12. 保護WLAN。
13. 虛擬私人網路。
14. 入侵偵測系統。
15. 無線公鑰基礎設施。
V. 附錄。
附錄A:十進位/十六進位/二進位轉換表。
附錄B:WEPCrack利用代碼範例。
附錄C:參考文獻。