The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; along with attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. One chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised.
This book is intended for novices and anyone in a technical role either as the family tech support to corporate IT managers. It also assumes some familiarity with basic networking and computer use.
Attacks detailed in this book include:
Read alsoTime of the Rangers
Following up on his magnificent history of the 19th century Texas Rangers, Mike Cox now takes us from 1900 through the present. From horseback to helicopters, from the frontier cattle days through the crime-ridden boom-or-bust oil field era, from Prohibition to World War II espionage to the violent ethnic turbulence of the ‘50s and ‘60s – which…
- 802.11 Wireless-Infrastructure Attacks
- 802.11 Wireless-Client Attacks
- Bluetooth Attacks
- RFID Attacks
- Analog Wireless Device Attacks
- Bad Encryption
- Attacks on Cell Phones, PDAs and Other Hybrid Devices