Hacking Wireless Networks For Dummies

John Wiley & Sons

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices
Read more

About the author

Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response.

Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.

Read more

Reviews

Loading...

Additional Information

Publisher
John Wiley & Sons
Read more
Published on
May 9, 2011
Read more
Pages
384
Read more
ISBN
9781118084922
Read more
Features
Read more
Read more
Language
English
Read more
Genres
Computers / Networking / General
Computers / Security / General
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Barry D. Lewis
You’ve probably heard the expression, “It’s time to cut the cord.” Well, it may be time to “cut the cables” at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can: Remain connected to the office in airports and hotels Access the Internet and other network resources in the lunchroom, conference room, or anywhere there’s an access point Use your PDA or laptop to query your database from the warehouse or the boardroom Check e-mail wirelessly when you’re on the road Get rid of the cable clutter in your office

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you:

Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth Perform a site survey and select the right standard, mode, access point, channel and antenna Check online to verify degree of interoperability of devices from various vendors Install clients and set up roaming Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network) Set up multiple access points to form a larger wireless network

Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!

Kevin Beaver
The move to manage medicine from a financial perspective, i.e. managed care, has added huge layers of bureaucratic and administrative functions to healthcare. The need to have the ability to track patient medical records, mandated by government legislation such as HIPAA, is bringing new technologies and processes into the healthcare arena. A universal medical record system and absolute patient portability is a definite possibility in the not too distant future. All of these issues beg for clear IT solutions.

Healthcare Information Systems, Second Edition approaches these challenges and opportunitites as pieces of a complex puzzle. It not only brings you up-to-date on the technology involved, but also explains how that technology interrelates and affects healthcare organizations. The book gives you complete coverage of all aspects of information technology as it relates to the healthcare industry.

In Healthcare Information Systems you will find:
An overview of healthcare systems
Tips on disaster planning and system security
Improving quality, reducing risks, and understanding costs
An in-depth look into the HIPAA regulations
EMR and the data warehouse
Information on managing the healthcare community
A look at the changing organization
Views on telemedicine, the Internet, and emerging technologies
Ideas on using IT to deal with increasing government regulation

In addition, the new edition has expanded coverage of HIPAA, wireless networks and communications, telemedicine, and the increasing role of the Internet in all facets of healthcare. Healthcare Information Systems presents workable solutions to the real problems you will face both today and tomorrow.
Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.

Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks Develop an effective ethical hacking plan that keeps your system safe Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure

Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.