BackTrack testing wireless network security /
Guardat en:
| Autor principal: | Cardwell, Kevin |
|---|---|
| Autor corporatiu: | ebrary, Inc |
| Format: | Electrònic eBook |
| Idioma: | anglès |
| Publicat: |
Birmingham :
Packt Pub.,
2013.
|
| Col·lecció: | Open source : community experience distilled
|
| Matèries: | |
| Accés en línia: | An electronic book accessible through the World Wide Web; click to view |
| Etiquetes: |
Afegir etiqueta
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
Ítems similars
BackTrack testing wireless network security /
per: Cardwell, Kevin
Publicat: (2013)
per: Cardwell, Kevin
Publicat: (2013)
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
per: Ramachandran, Vivek
Publicat: (2011)
per: Ramachandran, Vivek
Publicat: (2011)
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
per: Ramachandran, Vivek
Publicat: (2011)
per: Ramachandran, Vivek
Publicat: (2011)
Build your own security lab a field guide for network testing /
per: Gregg, Michael (Michael C.)
Publicat: (2008)
per: Gregg, Michael (Michael C.)
Publicat: (2008)
Build your own security lab a field guide for network testing /
per: Gregg, Michael (Michael C.)
Publicat: (2008)
per: Gregg, Michael (Michael C.)
Publicat: (2008)
Security in wireless LANs and MANs
per: Hardjono, Thomas
Publicat: (2005)
per: Hardjono, Thomas
Publicat: (2005)
Security in wireless LANs and MANs
per: Hardjono, Thomas
Publicat: (2005)
per: Hardjono, Thomas
Publicat: (2005)
Security for mobile networks and platforms
per: Aissi, Selim
Publicat: (2006)
per: Aissi, Selim
Publicat: (2006)
Security for mobile networks and platforms
per: Aissi, Selim
Publicat: (2006)
per: Aissi, Selim
Publicat: (2006)
Wireless communications security : solutions for the internet of things /
per: Penttinen, Jyrki T. J.
Publicat: (2017)
per: Penttinen, Jyrki T. J.
Publicat: (2017)
Wireless communications security : solutions for the internet of things /
per: Penttinen, Jyrki T. J.
Publicat: (2017)
per: Penttinen, Jyrki T. J.
Publicat: (2017)
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack /
per: Ali, Shakeel
Publicat: (2011)
per: Ali, Shakeel
Publicat: (2011)
BackTrack 4 assuring security by penetration testing : master the art of penetration testing with BackTrack /
per: Ali, Shakeel
Publicat: (2011)
per: Ali, Shakeel
Publicat: (2011)
How to cheat at securing a wireless network
Publicat: (2006)
Publicat: (2006)
How to cheat at securing a wireless network
Publicat: (2006)
Publicat: (2006)
WarDriving drive, detect, defend: a guide to wireless security /
per: Hurley, Chris
Publicat: (2004)
per: Hurley, Chris
Publicat: (2004)
WarDriving drive, detect, defend: a guide to wireless security /
per: Hurley, Chris
Publicat: (2004)
per: Hurley, Chris
Publicat: (2004)
Mobile security
per: Furnell, Steven
Publicat: (2009)
per: Furnell, Steven
Publicat: (2009)
Mobile security
per: Furnell, Steven
Publicat: (2009)
per: Furnell, Steven
Publicat: (2009)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
per: Chandra, Praphul
Publicat: (2005)
per: Chandra, Praphul
Publicat: (2005)
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
per: Chandra, Praphul
Publicat: (2005)
per: Chandra, Praphul
Publicat: (2005)
Hack proofing your wireless network
per: Owens, Les
Publicat: (2001)
per: Owens, Les
Publicat: (2001)
Hack proofing your wireless network
per: Owens, Les
Publicat: (2001)
per: Owens, Les
Publicat: (2001)
Security in ad hoc and sensor networks
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
Security in ad hoc and sensor networks
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
per: Beyah, Raheem (Raheem A.), 1976-
Publicat: (2010)
Nessus, Snort, & Ethereal power tools customizing open source security applications /
per: Archibald, Neil
Publicat: (2005)
per: Archibald, Neil
Publicat: (2005)
Nessus, Snort, & Ethereal power tools customizing open source security applications /
per: Archibald, Neil
Publicat: (2005)
per: Archibald, Neil
Publicat: (2005)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
per: Cardwell, Kevin
Publicat: (2014)
per: Cardwell, Kevin
Publicat: (2014)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
per: Cardwell, Kevin
Publicat: (2014)
per: Cardwell, Kevin
Publicat: (2014)
Wireless mobile internet security
per: Rhee, Man Young
Publicat: (2013)
per: Rhee, Man Young
Publicat: (2013)
Wireless mobile internet security
per: Rhee, Man Young
Publicat: (2013)
per: Rhee, Man Young
Publicat: (2013)
BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 /
per: Pritchett, Willie
Publicat: (2012)
per: Pritchett, Willie
Publicat: (2012)
BackTrack 5 cookbook over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5 /
per: Pritchett, Willie
Publicat: (2012)
per: Pritchett, Willie
Publicat: (2012)
From problem toward solution wireless sensor networks security /
Publicat: (2009)
Publicat: (2009)
From problem toward solution wireless sensor networks security /
Publicat: (2009)
Publicat: (2009)
Security and privacy in mobile and wireless networking /
Publicat: (2009)
Publicat: (2009)
Security and privacy in mobile and wireless networking /
Publicat: (2009)
Publicat: (2009)
CWSP certified wireless security professional official : study guide /
Publicat: (2010)
Publicat: (2010)
CWSP certified wireless security professional official : study guide /
Publicat: (2010)
Publicat: (2010)
Hacking with Kali : practical penetration testing techniques /
per: Broad, James
Publicat: (2014)
per: Broad, James
Publicat: (2014)
Ítems similars
-
BackTrack testing wireless network security /
per: Cardwell, Kevin
Publicat: (2013) -
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
per: Ramachandran, Vivek
Publicat: (2011) -
BackTrack 5 wireless penetration testing beginner's guide : master bleeding edge wireless testing techniques with BackTrack 5 /
per: Ramachandran, Vivek
Publicat: (2011) -
Build your own security lab a field guide for network testing /
per: Gregg, Michael (Michael C.)
Publicat: (2008) -
Build your own security lab a field guide for network testing /
per: Gregg, Michael (Michael C.)
Publicat: (2008)