Kali Linux wireless penetration testing cookbook: identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security
More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless net...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2017
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781783554089/?ar |
Zusammenfassung: | More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... |
Beschreibung: | Online resource; title from title page (Safari, viewed January 19, 2018) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781783988440 1783988444 1783554088 9781783554089 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047685522 | ||
003 | DE-627-1 | ||
005 | 20240228120423.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2017 xx |||||o 00| ||eng c | ||
020 | |a 9781783988440 |c electronic bk. |9 978-1-78398-844-0 | ||
020 | |a 1783988444 |c electronic bk. |9 1-78398-844-4 | ||
020 | |a 1783554088 |9 1-78355-408-8 | ||
020 | |a 9781783554089 |9 978-1-78355-408-9 | ||
020 | |a 9781783554089 |9 978-1-78355-408-9 | ||
035 | |a (DE-627-1)047685522 | ||
035 | |a (DE-599)KEP047685522 | ||
035 | |a (ORHE)9781783554089 | ||
035 | |a (DE-627-1)047685522 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean-Philip |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Kali Linux wireless penetration testing cookbook |b identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security |c Sean-Philip Oriyano |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2017 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from title page (Safari, viewed January 19, 2018) | ||
520 | |a More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Wireless Internet | |
650 | 4 | |a Kali Linux | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Internet mobile | |
650 | 4 | |a COMPUTERS ; Security ; Networking | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Wireless Internet | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781783554089/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047685522 |
---|---|
_version_ | 1821494863809478656 |
adam_text | |
any_adam_object | |
author | Oriyano, Sean-Philip |
author_facet | Oriyano, Sean-Philip |
author_role | aut |
author_sort | Oriyano, Sean-Philip |
author_variant | s p o spo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047685522 (DE-599)KEP047685522 (ORHE)9781783554089 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02223cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-047685522</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120423.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2017 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783988440</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-78398-844-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783988444</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-78398-844-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783554088</subfield><subfield code="9">1-78355-408-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783554089</subfield><subfield code="9">978-1-78355-408-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783554089</subfield><subfield code="9">978-1-78355-408-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047685522</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047685522</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781783554089</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047685522</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux wireless penetration testing cookbook</subfield><subfield code="b">identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security</subfield><subfield code="c">Sean-Philip Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed January 19, 2018)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ...</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet mobile</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Networking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781783554089/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047685522 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:09Z |
institution | BVB |
isbn | 9781783988440 1783988444 1783554088 9781783554089 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Packt Publishing |
record_format | marc |
spelling | Oriyano, Sean-Philip VerfasserIn aut Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Sean-Philip Oriyano Birmingham, UK Packt Publishing 2017 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from title page (Safari, viewed January 19, 2018) More and more organizations are moving towards wireless networks and Wi-Fi is popularly adopted in market. The security of wireless networks is important than ever before due to widespread usage of WiFi networks. This book has recipes that will enable you to maximize the success of your wireless network testing using advanced ethical hacking ... Kali Linux Penetration testing (Computer security) Wireless Internet Tests d'intrusion Internet mobile COMPUTERS ; Security ; Networking |
spellingShingle | Oriyano, Sean-Philip Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Kali Linux Penetration testing (Computer security) Wireless Internet Tests d'intrusion Internet mobile COMPUTERS ; Security ; Networking |
title | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security |
title_auth | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security |
title_exact_search | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security |
title_full | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Sean-Philip Oriyano |
title_fullStr | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Sean-Philip Oriyano |
title_full_unstemmed | Kali Linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security Sean-Philip Oriyano |
title_short | Kali Linux wireless penetration testing cookbook |
title_sort | kali linux wireless penetration testing cookbook identify and assess vulnerabilities present in your wireless network wi fi and bluetooth enabled devices to improve your wireless security |
title_sub | identify and assess vulnerabilities present in your wireless network, Wi-Fi, and Bluetooth enabled devices to improve your wireless security |
topic | Kali Linux Penetration testing (Computer security) Wireless Internet Tests d'intrusion Internet mobile COMPUTERS ; Security ; Networking |
topic_facet | Kali Linux Penetration testing (Computer security) Wireless Internet Tests d'intrusion Internet mobile COMPUTERS ; Security ; Networking |
work_keys_str_mv | AT oriyanoseanphilip kalilinuxwirelesspenetrationtestingcookbookidentifyandassessvulnerabilitiespresentinyourwirelessnetworkwifiandbluetoothenableddevicestoimproveyourwirelesssecurity |