Hacking wireless access points : (Record no. 56498)

000 -LEADER
fixed length control field 02040nam a22002777a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220110161403.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210211b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128092255
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780128053157
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.68
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Kurtz, Jennifer Ann
Relator term Author
245 10 - TITLE STATEMENT
Title Hacking wireless access points :
Remainder of title cracking, tracking, and signal jacking /
Statement of responsibility, etc Jennifer Ann Kurtz
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cambridge, MA ;
-- Amsterdam :
Name of publisher, distributor, etc Syngress,
Date of publication, distribution, etc c2017.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 155 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - CONTENTS
Formatted contents note Chapter 1. Wireless Technology Overview Chapter 2. Wireless Adoption Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points Chapter 4. Hacks Against Individuals Chapter 5. WAPs in Commercial and Industrial Contexts Chapter 6. WAPs in Medical Environments Chapter 7. Hacking Wireless Access Points: Governmental Context Chapter 8. Noncivilian Government Context Chapter 9. Summary and Call to Action.
520 ## - SUMMARY, ETC.
Summary, etc Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
526 ## - STUDY PROGRAM INFORMATION NOTE
-- 000-099
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Wireless LANs
General subdivision Security measures.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kaczmarek, Richard
Relator term Technical editor
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type BOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Full call number Barcode Date last seen Cost, replacement price Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY SUBJECT REFERENCE 2018-07-26 ALBASA 4498.00 48654 004.68 K9674 2017 CITU-CL-48654 2021-02-11 4498.00 2021-02-11 BOOK