Prima edizione
EUR 24,00
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloSoftcover. Condizione: Neu. 1. Auflage. 166 pages with many b/w-illustrations.
EUR 38,99
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
EUR 35,06
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 226 1st Edition.
EUR 33,51
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 226.
EUR 35,92
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloCondizione: New. pp. 226.
EUR 38,46
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback / softback. Condizione: New. New copy - Usually dispatched within 4 working days. 423.
EUR 49,96
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloBrand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 36,10
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloPaperback. Condizione: New.
EUR 4,36
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
Da: moluna, Greven, Germania
EUR 49,09
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Describes the ways that a penetration tester can gather and apply the information available from radio traffic. This book includes information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, .
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 48,70
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling. Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing Includes real-world case studies of actual penetration tests using radio profiling Covers data leakage, frequency, attacks, and information gathering 226 pp. Englisch.
Da: Brook Bookstore On Demand, Napoli, NA, Italia
EUR 39,47
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: new. Questo è un articolo print on demand.
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 52,88
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.