0
17 years of experience17 years of Excellence
SUBJECTS
ADV. SEARCH
Indian Books on Discounts
  WarDriving: Drive, Detect, Defend, A Guide to Wireless Security
 

Wardriving: Drive, Detect, Defend, A Guide To Wireless Security

by Chris Hurley,Frank Thornton,Michael Puchol,Russ Rogers

  Price : Rs 400.00
  Your Price : Rs 340.00
Discount
15
In Stock
  Wardriving has brought some of the top people in the wireless industry together to put together a truly informative book on what wardriving is and the tools that should be part of any IT department`s arsenal that either has wireless or is looking to deploy it." John Kleinschmidt, Founder of Michiganwireless.org The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wirelessequipped laptop to map both protected and unprotected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers. Wireless networks have become a way of life in the past two years. As more wireless networks are deployed the need to secure them increases. This book educates users of wireless networks as well as those who run the networks about the insecurities associated with wireless networking. This effort is called WarDriving. In order to successfully WarDrive there are hardware and software tool required. This book covers those tools, along with cost estimates and recommendations. Since there are hundreds of possible configurations that can be used for WarDriving, some of the most popular are presented to help readers decide what to buy for their own WarDriving setup. Many of the tools that a WarDriver uses are the same tools that could be used by an attacker to gain unauthorized access to a wireless network. Since this is not the goal of a WarDriver, the methodology that users can use to ethically WarDrive is presented. In addition, complete coverage of WarDriving applications, such as NetStumbler, MiniStumbler; and Kismet, are covered. Table of Contents1: Learning to WarDrive2: NetStumbler and MiniStumbler: An Overview3: Operating NetStumbler and MiniStumbler 4: Installing Kismet in Slackware Linux 9.1 5: Installing Kismet in Fedora Core 1 Linux 9.0 6: Configuring and Using Kismet 7: Mapping WarDrives Using Stumbverter 8: Organizing WarDrives 9: Attacking Wireless Networks 10: Basic Wireless Network Security 11: Advanced Wireless Network Security 12: Fast Track Index About the AuthorChris Hurley is a Principal Information Security Engineer working in Washington DC on vulnerability assessments, penetration testing, forensics, and incident response on both wired and wireless networks. He is the organizer of the WorldWide WarDrive and has been the subject of several interviews and stories regarding the WWWD. Chris is a primary organizer of DefCon and the DefCon WarDriving Contest. Michael Puchol is a WarDriving pioneer and is creator of the widely used StumbVerter mapping software. Frank Thornton runs his own consulting firm, Blackthorn Systems and as a detective and forensics expert has investigated over 100 homicides and thousands of other crime scenes. Russ Rogers is the President and cofounder of Security Horizon, Inc and a primary organizer of DefCon.
 


Credit Cards
Payment accepted by All Major Credit and Debit Cards, Net Banking, Cash Cards, Paytm, UPI, Paypal. Our payment gateways are 100% secure.
Check Delivery
Books of Similar Interest
15%
MCSE(Exam70-297)Designing a Windows Server 2003 Active Directory and Network Infrastructure:Study Guide & DVD Training System(Book/DVD)
by Barber
18%
Multimedia Systems
by Buford
15%
Learning ASPNET 2.0 With AJAX:A Practical Hands on Guid
by Liberty
10%
Grid Computing Security
by Anirban Chakrabarti
C++ Unleashed
by Liberty
Best Book Mart
Support

Call Us Phone : +91-9266663909
Email Us Email : support [at] bestbookmart.com
Working Hours Timing : 10:00 AM to 6:00 PM (Mon-Fri)
Powered By
CCAvenue
SSL Protection