Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate Through his experiences as a penetration tester, Josh has worked with hundreds of organizations on attacking and defending mobile devices and wireless systems, disclosing significant product and protocol security weaknesses to well-known organizations.
His thesis work, which focused on fingerprinting You're currently accessing eBooks. Some eBooks aren't available in all countries. By letting us know your country we can show you books that are relevant to you.
Toggle navigation. New to eBooks.
How many copies would you like to buy? Hacking Exposed Wireless, Third Edition 3rd ed. Add to Cart Add to Cart.
Hacking Exposed NextGen
Add to Wishlist Add to Wishlist. Exploit and defend against the latest wireless network attacks Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. More Computers.