000 02040nam a22002777a 4500
999 _c56498
_d56498
003 CITU
005 20220110161403.0
008 210211b ||||| |||| 00| 0 eng d
020 _a9780128092255
020 _a9780128053157
082 _a004.68
100 1 _aKurtz, Jennifer Ann
_eAuthor
245 1 0 _aHacking wireless access points :
_bcracking, tracking, and signal jacking /
_cJennifer Ann Kurtz
264 1 _aCambridge, MA ;
_aAmsterdam :
_bSyngress,
_cc2017.
300 _axv, 155 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aChapter 1. Wireless Technology Overview Chapter 2. Wireless Adoption Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points Chapter 4. Hacks Against Individuals Chapter 5. WAPs in Commercial and Industrial Contexts Chapter 6. WAPs in Medical Environments Chapter 7. Hacking Wireless Access Points: Governmental Context Chapter 8. Noncivilian Government Context Chapter 9. Summary and Call to Action.
520 _aHacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
526 _a000-099
650 0 _aWireless LANs
_xSecurity measures.
700 1 _aKaczmarek, Richard
_eTechnical editor
942 _2ddc
_cBK