000 -LEADER |
fixed length control field |
02040nam a22002777a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220110161403.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210211b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128092255 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780128053157 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004.68 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Preferred name for the person |
Kurtz, Jennifer Ann |
Relator term |
Author |
245 10 - TITLE STATEMENT |
Title |
Hacking wireless access points : |
Remainder of title |
cracking, tracking, and signal jacking / |
Statement of responsibility, etc |
Jennifer Ann Kurtz |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cambridge, MA ; |
-- |
Amsterdam : |
Name of publisher, distributor, etc |
Syngress, |
Date of publication, distribution, etc |
c2017. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xv, 155 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
Chapter 1. Wireless Technology Overview Chapter 2. Wireless Adoption Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points Chapter 4. Hacks Against Individuals Chapter 5. WAPs in Commercial and Industrial Contexts Chapter 6. WAPs in Medical Environments Chapter 7. Hacking Wireless Access Points: Governmental Context Chapter 8. Noncivilian Government Context Chapter 9. Summary and Call to Action. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology. |
526 ## - STUDY PROGRAM INFORMATION NOTE |
-- |
000-099 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Wireless LANs |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Kaczmarek, Richard |
Relator term |
Technical editor |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
BOOK |