Cargando…
Seven Deadliest Wireless Technologies Attacks
How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier
2010
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1315412 |
Sumario: | How can an information security professional keep up with all of the hacks, attacks, and exploits? One way to find out what the worst of the worst are is to read the seven books in our Seven Deadliest Attacks Series. Not only do we let you in on the anatomy of these attacks but we also tell you how to get rid of them and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this book include:Bluetooth AttacksCredit Card, Access Card, and Passport AttacksBad Encryption |
---|