Wireless Security/War Driving |
|
Wi-Foo II: The Secrets of Wireless Hacking |
Author: Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky |
Publisher: Addison-Wesley Professional |
Year: 2008 |
Pages: 624 |
Amazon's book description: This title has not yet been released. |
|
|
|
Kismet Hacking |
Author: Brad Haines, Frank Thornton |
Publisher: Syngress |
Year: 2008 |
Pages: 400 |
Amazon's book description: Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend. |
|
|
|
Hacking Exposed Wireless |
Author: Johnny Cache, Vincent Liu |
Publisher: McGraw-Hill Osborne Media |
Year: 2007 |
Pages: 386 |
Amazon's book description: Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute debilitating attacks. Find out how to plug security holes in Wi-Fi/802.11 and Bluetooth systems and devices. You'll also learn how to launch wireless exploits from Metasploit, employ bulletproof authentication and encryption, and sidestep insecure wireless hotspots. The book includes vital details on new, previously unpublished attacks alongside real-world countermeasures. |
|
|
|
Secure Roaming in 802.11 Networks |
Author: Jahanzeb Khan, Anis Khwaja |
Publisher: Newnes |
Year: 2007 |
Pages: 368 |
Amazon's book description: This book explores the fundamental concepts, basic theory, and key principles of 802.11 networks with roaming capabilities. Today, we increasingly expect to find public Wide Local Area Network (WLAN) 802.11 access in our airports, public spaces, and hotels, and we want to maintain our connections when were mobile and using 802.11 WLANs. |
|
|
|
Guide to Wireless Network Security |
Author: John R. Vacca |
Publisher: Springer |
Year: 2006 |
Pages: 848 |
Amazon's book description: With the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure, reliable operations. From basic concepts to designing principles to deployment, all critical concepts and phases are explained in detail. The book also includes coverage of wireless security testing techniques and intrusion prevention techniques. |
|
|
|
Wardriving & Wireless Penetration Testing |
Author: Chris Hurley, Russ Rogers, Frank Thornton, Daniel Connelly, Brian Baker |
Publisher: Syngress |
Year: 2006 |
Pages: 504 |
Amazon's book description: Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. |
|
|
|
Wireless Communications Security |
Author: Hideki Imai, Mohammad Ghulam Rahman, Kazukuni Kobara |
Publisher: Artech House Publishers |
Year: 2005 |
Pages: 202 |
Amazon's book description: Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography techniques, such as private/public key encryption, digital signatures, and block and stream ciphers. The book provides expert guidance on how to evaluate cryptography deployment impact on current wireless network architectures and implement an effective cryptography architecture for any organization. This forward-looking resource offers the technical know-how practitioners need to understand and work with the security concepts and techniques used for 2nd, 3rd, and 4th generation mobile networks. |
|
|
|
Wireless Security Handbook |
Author: Aaron E. Earle |
Publisher: AUERBACH |
Year: 2005 |
Pages: 384 |
Amazon's book description: The Wireless Security Handbook provides a well-rounded overview of wireless network security. It examines wireless from multiple perspectives, including those of an auditor, security architect, and hacker. This wide scope benefits anyone who has to administer, secure, hack, or conduct business on a wireless network. This text tackles wireless risk from many angles. It discusses the mitigation of wireless risk at the policy level, cost-effective ways of deploying wireless across large enterprises, and financial controls that reduce unforeseen risks in wireless projects. The handbook also offers the technical details of how you can design, build, and hack nearly all wireless security components. This volume also helps advance your career by covering all of the objectives of the three widely recognized wireless certifications--those administered by Planet3 Wireless and Cisco Systems. The book focuses on the wireless local area networking technologies that help you meet these objectives, while also analyzing almost all other facets of mobile communications. |
|
|
|
Wi-Foo: The Secrets of Wireless Hacking |
Author: Andrew Vladimirov, Konstantin V. Gavrilenko, Andrei A. Mikhailovsky |
Publisher: Addison-Wesley Professional |
Year: 2004 |
Pages: 592 |
Amazon's book description: The definitive guide to penetrating and defending wireless networks. |
|
|
|
WarDriving: Drive, Detect, Defend, A Guide to Wireless Security |
Author: Chris Hurley, Michael Puchol, Russ Rogers, Frank Thornton |
Publisher: Syngress |
Year: 2004 |
Pages: 512 |
Amazon's book description: The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. |
|
|
|
Wireless Hacking: Projects for Wi-Fi Enthusiasts |
Author: Lee Barken, Eric Bermel, John Eder, Matt Fanady, Alan Koebrick, Michael Mee, Marc Palumbo |
Publisher: Syngress |
Year: 2004 |
Pages: 416 |
Amazon's book description: Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (Wi-Fi) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks. |
|
|
|
Real 802.11 Security: Wi-Fi Protected Access and 802.11i |
Author: Jon Edney, William A. Arbaugh |
Publisher: Addison-Wesley Professional |
Year: 2003 |
Pages: 480 |
Amazon's book description: Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards. |
|
|
|
Maximum Wireless Security |
Author: Cyrus Peikari |
Publisher: Sams |
Year: 2002 |
Pages: 408 |
Amazon's book description: Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems. |
|
|