MARC details
000 -LEADER |
fixed length control field |
01812cam a2200301 a 4500 |
001 - CONTROL NUMBER |
control field |
a3766 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SIRSI |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
100715s2010 nyua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2010027293 |
019 ## - |
-- |
489010538 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071666619 (alk. paper) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0071666613 (alk. paper) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) i9780071666619 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5103.2 |
Item number |
.C23 2010 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cache, Johnny. |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed wireless : |
Remainder of title |
wireless security secrets & solutions / |
Statement of responsibility, etc. |
Johnny Cache, Joshua Wright, Vincent Liu. |
250 ## - EDITION STATEMENT |
Edition statement |
2nd ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw-Hill, |
Date of publication, distribution, etc. |
c2010. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxv, 484 p. : |
Other physical details |
ill ; |
Dimensions |
24 cm. |
490 0# - SERIES STATEMENT |
Series statement |
Hacking exposed. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Build and configure your Wi-Fi attack arsenal with the best hardware and software tools; explore common weaknesses in WPA2 networks through the eyes of an attacker; leverage post-compromise remote client attacks on Windows 7 and Mac OS X; master attack tools to exploit wireless systems, including Aircrack-ng, coWPAtty, Pyrit, IPPON, FreeRADIUS-WPE, KillerBee, and Wireshark; evaluate your threat to software update impersonation attacks on public networks; assess your threat to eavesdropping attacks ... using commercial and custom tools; develop advanced skills leveraging Software Defined Radio and other flexible frameworks; apply comprehensive defenses to protect your wireless devices and infrastructure." -- Cover, p. [4] |
500 ## - GENERAL NOTE |
General note |
A companion website provides free source code, scripts, high-resolution images, and bonus materials : http://www.hackingexposedwireless.com . |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless communication systems |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless LANs |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Wright, Joshua. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Liu, Vincent. |