Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Used book that is in clean, average condition without any missing pages.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
paperback. Condizione: Good. Open Books is a nonprofit social venture that provides literacy experiences for thousands of readers each year through inspiring programs and creative capitalization of books.
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: ThriftBooks-Dallas, Dallas, TX, U.S.A.
Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Da: Jenson Books Inc, Logan, UT, U.S.A.
paperback. Condizione: Very Good. A clean, cared for item that is unmarked and shows limited shelf wear.
Da: Equipment for Living, Aliquippa, PA, U.S.A.
Condizione: good.
Da: WeBuyBooks, Rossendale, LANCS, Regno Unito
EUR 4,02
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Very Good. Most items will be dispatched the same or the next working day. A copy that has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Da: ThriftBooks-Atlanta, AUSTELL, GA, U.S.A.
Paperback. Condizione: Good. No Jacket. Former library book; Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Da: HPB-Red, Dallas, TX, U.S.A.
paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: Better World Books Ltd, Dunfermline, Regno Unito
EUR 5,37
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Da: Better World Books, Mishawaka, IN, U.S.A.
Condizione: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Editore: McGraw-Hill Osborne Media, New York NY, 2010
ISBN 10: 0071666613 ISBN 13: 9780071666619
Lingua: Inglese
Da: OddReads, Harper, TX, U.S.A.
Soft cover. Condizione: As New. No Jacket. 2nd Edition.
Condizione: New.
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Condizione: As New. Unread book in perfect condition.
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Lingua: Inglese
Da: Rarewaves USA, OSWEGO, IL, U.S.A.
Paperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.
EUR 44,48
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Lingua: Inglese
Da: Rarewaves.com USA, London, LONDO, Regno Unito
EUR 76,17
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.
EUR 59,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 59,20
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Condizione: New. pp. 560 3rd Edition.
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Lingua: Inglese
Da: Rarewaves USA United, OSWEGO, IL, U.S.A.
EUR 63,66
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.
Editore: McGraw-Hill Education - Europe, US, 2015
ISBN 10: 0071827633 ISBN 13: 9780071827638
Lingua: Inglese
Da: Rarewaves.com UK, London, Regno Unito
EUR 68,37
Quantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New. Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Exploit and defend against the latest wireless network attacksLearn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers impersonate cellular networks. Hacking Exposed Wireless, Third Edition features expert coverage of ever-expanding threats that affect leading-edge technologies, including Bluetooth Low Energy, Software Defined Radio (SDR), ZigBee, and Z-Wave. Assemble a wireless attack toolkit and master the hacker's weaponsEffectively scan and enumerate WiFi networks and client devicesLeverage advanced wireless attack tools, including Wifite, Scapy, Pyrit, Metasploit, KillerBee, and the Aircrack-ng suiteDevelop and launch client-side attacks using Ettercap and the WiFi PineappleHack cellular networks with Airprobe, Kraken, Pytacle, and YateBTSExploit holes in WPA and WPA2 personal and enterprise security schemesLeverage rogue hotspots to deliver remote access software through fraudulent software updatesEavesdrop on Bluetooth Classic and Bluetooth Low Energy trafficCapture and evaluate proprietary wireless technology with Software Defined Radio toolsExplore vulnerabilities in ZigBee and Z-Wave-connected smart homes and officesAttack remote wireless networks using compromised Windows systems and built-in tools.
EUR 113,00
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Usado - bueno.
Da: Majestic Books, Hounslow, Regno Unito
EUR 86,80
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. Print on Demand pp. 560.
Da: Biblios, Frankfurt am main, HESSE, Germania
EUR 86,42
Quantità: 4 disponibili
Aggiungi al carrelloCondizione: New. PRINT ON DEMAND pp. 560.
Da: moluna, Greven, Germania
EUR 62,21
Quantità: Più di 20 disponibili
Aggiungi al carrelloKartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Featuring the proven Hacking Exposed method, this new edition of this bestseller reveals how to defend against the latest wireless network attacks by getting inside the mind of the hacker.Über den AutorJoshua Wright (Rhode Isla.