Catalog Search Results
1 online resource (xxii, 519 pages : illustrations)
Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how attackers...
IL: MG - BL: 5.6 - AR Pts: 1
Most people today have cell phones. People rely on cell phones for communication. Cell phones also store a lot of personal data. Cell Phone Privacy explores how people can protect this data.
These searches are similar to the search you tried. Would you like to try one of these instead?
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request