Пт, 08 Ноя 24, 1:09 AM
Приветствую Вас Гость | Регистрация | Вход

К Н И Г И

Меню сайта
Форма входа
Поиск
Категории раздела
Art, Drawing [1]
Cooking [4]
Computers [4]
Electrical Engineering [2]
Encyclopedias [1]
Hobby, DIY [12]
Home Design [1]
Fiction, Non Fiction [0]
For Children [0]
Graphics Programs [6]
Health and Care [1]
Microcontrollers [6]
Microsoft Office [1]
Mobile Devices [2]
Music [0]
Photography [1]
Popular science [3]
Programming [36]
Psychology [0]
Robotics [5]
Security [2]
Self-development [0]
Technics [4]
Travel [1]
Unix and Linux [0]
Web Design [0]
Woodworking [1]
Other [3]
Видеокурсы


Любимые блюда из грибов (2010)(mp4) 


Любимые блюда из творога (2010)(mp4) 


Любимые блюда из картофеля (2010)(mp4) 


Телеграм-бот мастер (2017) Видеокурс 


Креатив 4.0 (2015) Видеокурс 
Музыка


Christophe Goze - A Day in Ibiza vol.2 (2012) 


Udo Vismann - Balance (2015) 


Jennifer DeFrayne - By a Wire (2014) 


Louis Landon - Solo Piano for Peace (2010) 


120 Sax Standards (2012) 
Интересное


Все верные решения (руководство по созданию статегий прорыва).


Метод Бронникова. “Информационное развитие человека” (1-3 ступени).


"Книга, о которой говорят " в 43 книгах


Виктор Голявкин - Веселые рассказы.(mp3,64 kbps)


Болезни кишечника.Диагностика, лечение, профилактика.
Статистика

ОБЗОР САЙТА

Главная » Статьи » BOOKS » Programming

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking

Название: Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking
Автор: Jennifer Kurtz
Издательство: Syngress
Год: 2016
Формат: PDF
Размер: 5.6 Mb
Язык: English

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.
The book demonstrates a variety of ways that these vulnerabilities can be?and have been?exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.


Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
Presents concrete examples and real-world guidance on how to protect against wireless access point attacks

 

 

Скачать | UsersCloud

Скачать | Filescdn

 


Еще больше ЗДЕСЬ


Категория: Programming  (23 Июл 17)
Теги: Cracking, Technology, Hacking Wireless, Tracking, Bluetooth
Всего комментариев: 0


Имя *:
Email *:
Код *: