Da: World of Books (was SecondSale), Montgomery, IL, U.S.A.
Condizione: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
Da: Better World Books, Mishawaka, IN, U.S.A.
Prima edizione
Condizione: Very Good. 1st Edition. Used book that is in excellent condition. May show signs of wear or have minor defects.
Da: Better World Books, Mishawaka, IN, U.S.A.
Prima edizione
Condizione: Good. 1st Edition. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Da: Better World Books, Mishawaka, IN, U.S.A.
Prima edizione
Condizione: Very Good. 1st Edition. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Da: ThriftBooks-Reno, Reno, NV, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less.
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Condizione: very_good. Gently read. May have name of previous ownership, or ex-library edition. Binding tight; spine straight and smooth, with no creasing; covers clean and crisp. Minimal signs of handling or shelving. 100% GUARANTEE! Shipped with delivery confirmation, if you're not satisfied with purchase please return item for full refund. Ships USPS Media Mail.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
paperback. Condizione: Good. Open Books is a nonprofit social venture that provides literacy experiences for thousands of readers each year through inspiring programs and creative capitalization of books.
Da: Equipment for Living, Aliquippa, PA, U.S.A.
Condizione: good.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Da: 3Brothers Bookstore, Egg harbor township, NJ, U.S.A.
Condizione: good. Books may contain some notes and highlighting. Supplements such as Access Codes, Cd's Dust Jackets, etc. are not guaranteed with used book purchases.
Lingua: Inglese
Editore: McGraw-Hill Education - Europe, United States, 2007
ISBN 10: 0072262583 ISBN 13: 9780072262582
Da: WorldofBooks, Goring-By-Sea, WS, Regno Unito
EUR 6,63
Quantità: 3 disponibili
Aggiungi al carrelloPaperback. Condizione: Very Good. Secure Your Wireless Networks the Hacking Exposed Way Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. Understand the concepts behind RF electronics, Wi-Fi/802.11, and Bluetooth Find out how hackers use NetStumbler, WiSPY, Kismet, KisMAC, and AiroPeek to target vulnerable wireless networks Defend against WEP key brute-force, aircrack, and traffic injection hacks Crack WEP at new speeds using Field Programmable Gate Arrays or your spare PS3 CPU cycles Prevent rogue AP and certificate authentication attacks Perform packet injection from Linux Launch DoS attacks using device driver-independent tools Exploit wireless device drivers using the Metasploit 3.0 Framework Identify and avoid malicious hotspots Deploy WPA/802.11i authentication and encryption using PEAP, FreeRADIUS, and WPA pre-shared keys. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Da: WeBuyBooks, Rossendale, LANCS, Regno Unito
EUR 4,09
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Da: Better World Books Ltd, Dunfermline, Regno Unito
Prima edizione
EUR 5,44
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. 1st Edition. Ships from the UK. Used book that is in clean, average condition without any missing pages.
Da: Better World Books Ltd, Dunfermline, Regno Unito
EUR 5,81
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Lingua: Inglese
Editore: McGraw-Hill Osborne Media, New York NY, 2010
ISBN 10: 0071666613 ISBN 13: 9780071666619
Da: OddReads, Harper, TX, U.S.A.
Soft cover. Condizione: As New. No Jacket. 2nd Edition.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 48,62
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
EUR 47,43
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
EUR 50,69
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
Da: California Books, Miami, FL, U.S.A.
EUR 53,23
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Da: GreatBookPrices, Columbia, MD, U.S.A.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 38,37
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Lingua: Inglese
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Da: Rarewaves USA, OSWEGO, IL, U.S.A.
EUR 61,81
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.
Da: GreatBookPricesUK, Woodford Green, Regno Unito
EUR 54,19
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Lingua: Inglese
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 73,23
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.