Hacking exposed wireless : (Record no. 17665)

MARC details
000 -LEADER
fixed length control field 01812cam a2200301 a 4500
001 - CONTROL NUMBER
control field a3766
003 - CONTROL NUMBER IDENTIFIER
control field SIRSI
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 100715s2010 nyua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2010027293
019 ## -
-- 489010538
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071666619 (alk. paper)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071666613 (alk. paper)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) i9780071666619
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5103.2
Item number .C23 2010
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Cache, Johnny.
245 10 - TITLE STATEMENT
Title Hacking exposed wireless :
Remainder of title wireless security secrets & solutions /
Statement of responsibility, etc. Johnny Cache, Joshua Wright, Vincent Liu.
250 ## - EDITION STATEMENT
Edition statement 2nd ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York :
Name of publisher, distributor, etc. McGraw-Hill,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 484 p. :
Other physical details ill ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Hacking exposed.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. "Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4]
500 ## - GENERAL NOTE
General note A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com .
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless communication systems
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Wireless LANs
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Wright, Joshua.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Liu, Vincent.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Shelving location Total checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     AUE Library Collection MAIN MAIN General   TK5103.2 .C23 2010 10043021 03/13/2021 1 11/19/2019 Books