Cargando…

Seven Deadliest Wireless Technologies Attacks

How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how...

Descripción completa

Detalles Bibliográficos
Autor principal: Haines, Brad
Lenguaje:eng
Publicado: Elsevier 2010
Materias:
Acceso en línea:http://cds.cern.ch/record/1315412
Descripción
Sumario:How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption