|
|
|
|
LEADER |
02805nmm a2200481 u 4500 |
001 |
EB001955263 |
003 |
EBX01000000000000001118165 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1420013017
|
020 |
|
|
|a 0849331889
|
020 |
|
|
|a 9781420013016
|
050 |
|
4 |
|a TK5103.2
|
100 |
1 |
|
|a Kipper, Gregory
|
245 |
0 |
0 |
|a Wireless crime and forensic investigation
|c Gregory Kipper
|
260 |
|
|
|a Boca Raton, FL
|b Auerbach Publications
|c 2007
|
300 |
|
|
|a xxviii, 251 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a Who Should Read This Book; Acknowledgments; About the Author; Technical Editors; Introduction; Contents; Chapter 1. Overview of Wireless Technologies and Security; Chapter 2. Wireless Threats, Vulnerabilities, and Security; Chapter 3. Wireless Crime Fighting; Chapter 4. Digital Forensic Principles and Wireless Forensics; Chapter 5. The Wireless Future; Glossary; Appendix A: Computer Fraud and Abuse Act 1986 (US) 18 USC 1030; Appendix B: Communications Interception Act; Appendix C: Acronyms; Appendix D: The 802.11 Alphabet; Index
|
653 |
|
|
|a Pocket computers / Security measures
|
653 |
|
|
|a Ordinateurs de poche / Sécurité / Mesures
|
653 |
|
|
|a Criminalité informatique / Enquêtes
|
653 |
|
|
|a Computer crimes / Investigation / fast
|
653 |
|
|
|a Transmission sans fil / Sécurité / Mesures
|
653 |
|
|
|a Computer crimes / Investigation / http://id.loc.gov/authorities/subjects/sh85029493
|
653 |
|
|
|a Téléphones cellulaires / Sécurité / Mesures
|
653 |
|
|
|a Cell phones / Security measures
|
653 |
|
|
|a Wireless communication systems / Security measures / fast
|
653 |
|
|
|a Wireless communication systems / Security measures
|
653 |
|
|
|a LAW / Forensic Science / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBB7C6703
|
015 |
|
|
|a GBA648480
|
776 |
|
|
|z 1420013017
|
776 |
|
|
|z 9781420013016
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781420013016/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 500
|
082 |
0 |
|
|a 363.25/968
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a From short text messaging to war driving, this book explores all aspects of wireless technology, how it is used in daily life, and how it will be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and forensic investigation techniques for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques and wireless crime techniques, as well as conducting forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, can stand
|