Paperback. Condition: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
First Edition
Softcover. Condition: Neu. 1. Auflage. 166 pages with many b/w-illustrations.
Condition: New. pp. 226 1st Edition.
£ 29.69
Convert currencyQuantity: 1 available
Add to basketCondition: New. pp. 226.
Condition: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
Brand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
Condition: New. pp. 226.
£ 30.62
Convert currencyQuantity: Over 20 available
Add to basketPaperback. Condition: New.
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
£ 32.62
Convert currencyQuantity: Over 20 available
Add to basketPaperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. 423.
£ 28.84
Convert currencyQuantity: 2 available
Add to basketPaperback. Condition: Brand New. 1st edition. 226 pages. 9.10x0.50x7.40 inches. In Stock.
Seller: Brook Bookstore On Demand, Napoli, NA, Italy
£ 35.37
Convert currencyQuantity: Over 20 available
Add to basketCondition: new. Questo è un articolo print on demand.
Published by Elsevier Science Okt 2012, 2012
ISBN 10: 1597497312 ISBN 13: 9781597497312
Language: English
Seller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
£ 43.65
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling. Author Matthew Neely is a respected and well-known expert and speaker on radio reconnaissance and penetration testing Includes real-world case studies of actual penetration tests using radio profiling Covers data leakage, frequency, attacks, and information gathering 226 pp. Englisch.
Published by Syngress Media|Syngress, 2012
ISBN 10: 1597497312 ISBN 13: 9781597497312
Language: English
Seller: moluna, Greven, Germany
£ 44
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Describes the ways that a penetration tester can gather and apply the information available from radio traffic. This book includes information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, .
Seller: AHA-BUCH GmbH, Einbeck, Germany
£ 47.40
Convert currencyQuantity: 2 available
Add to basketTaschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many ways that a penetration tester can gather and apply the information available from radio traffic. Stopping attacks means thinking like an attacker, and understanding all the ways that attackers gather information, or in industry terms profile, specific targets. With information from what equipment to use and how to find frequency information, to tips for reducing radio information leakage, to actual case studies describing how this information can be used to attack computer systems, this book is the go-to resource for penetration testing and radio profiling.