Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

Hacking Wireless Access Points

ebook

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

  • Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
  • Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
  • Presents concrete examples and real-world guidance on how to protect against wireless access point attacks

  • Expand title description text
    Publisher: Elsevier Science

    Kindle Book

    • Release date: December 8, 2016

    OverDrive Read

    • ISBN: 9780128092255
    • File size: 7192 KB
    • Release date: December 8, 2016

    EPUB ebook

    • ISBN: 9780128092255
    • File size: 7192 KB
    • Release date: December 8, 2016

    Formats

    Kindle Book
    OverDrive Read
    EPUB ebook

    Languages

    English

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

    The book demonstrates a variety of ways that these vulnerabilities can be—and have been—exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.

  • Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
  • Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
  • Presents concrete examples and real-world guidance on how to protect against wireless access point attacks

  • Expand title description text