|
|
|
|
LEADER |
02589nmm a2200385 u 4500 |
001 |
EB001954739 |
003 |
EBX01000000000000001117641 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Dion, Jason
|
245 |
0 |
0 |
|a WiFi hacking
|b wireless penetration testing for beginners
|c Jason Dion
|
246 |
3 |
1 |
|a Introduction to wireless hacking
|
260 |
|
|
|a [Place of publication not identified]
|b Packt Publishing
|c 2018
|
300 |
|
|
|a 1 streaming video file (1 hr., 43 min., 1 sec.)
|
653 |
|
|
|a Hacking / fast / (OCoLC)fst01909643
|
653 |
|
|
|a Penetration testing (Computer security) / fast / (OCoLC)fst01789566
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Piratage informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Computer security / fast / (OCoLC)fst00872484
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Title from resource description page (Safari, viewed June 21, 2018)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781789530193/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 000
|
520 |
|
|
|a "This course includes an overview of the various types of wireless (802.11) networks, available encryption security systems (WEP, WPA, and WPA2), and how to use open-source tools to hack and crack these vulnerable wireless (WiFi) networks. Since their introduction in 1999, wireless networks have been rapidly expanding in their usage and availability. Unfortunately, many people believe these wireless networks are designed as a secure solution for sharing data, but this is rarely the case. In this course, you will gain a deeper understanding of the WEP, WPA, and WPA2 wireless security protocols, and how to exploit their vulnerabilities in order to gain access to any wireless network during a penetration test. You will use this information to increase the security of your networks and to implement a better defensive security posture to prevent an attacker from accessing your networks."--Resource description page
|