Cardwell - BackTrack: testing wireless network security
Here you can read online Cardwell - BackTrack: testing wireless network security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham, year: 2013, publisher: Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
BackTrack: testing wireless network security: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "BackTrack: testing wireless network security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Cardwell: author's other books
Who wrote BackTrack: testing wireless network security? Find out the surname, the name of the author of the book and a list of all author's works by series.
BackTrack: testing wireless network security — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "BackTrack: testing wireless network security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
Copyright 2013 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.
First published: June 2013
Production Reference: 1180613
Published by Packt Publishing Ltd.
Livery Place
35 Livery Street
Birmingham B3 2PB, UK.
ISBN 978-1-78216-406-7
www.packtpub.com
Cover Image by Vivek Sinha (<>
)
Author
Kevin Cardwell
Reviewers
Aaron M. Woody
Abhinav Singh
Arif Jatmoko
Lee Allen
Acquisition Editors
Martin Bell
Erol Staveley
Commissioning Editor
Yogesh Dalvi
Technical Editor
Nitee Shetty
Copy Editors
Brandt D'Mello
Insiya Morbiwala
Alfida Paiva
Laxmi Subramanian
Project Coordinator
Joel Goveya
Proofreader
Clyde Jenkins
Indexer
Tejal R. Soni
Production Coordinator
Nilesh R. Mohite
Cover Work
Nilesh R. Mohite
Kevin Cardwell currently works as a freelance consultant and provides consulting services for companies throughout the world. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman and also developed the team to man the first Commercial Security Operations Center there. He has worked extensively with banks and financial institutions throughout the Middle East, Africa, Europe, and the UK. He currently provides consultancy services to commercial companies, governments, major banks, and financial institutions across the globe.
Aaron M. Woody is a security consultant with over 15 years of experience in Information Technology, with a focus on security. He is a speaker and an active instructor, teaching hacking, forensics, and information security. In addition to this, he has been a technical reviewer on several titles published by Packt Publishing . Aaron maintains two blogs: www.n00bpentesting.com and www.datacentricsec.com. Aaron can also be followed on Twitter at @shai_saint
.
Aaron is the author of Enterprise Security: A Data-Centric Approach to Securing the Enterprise , Packt Publishing .
Abhinav Singh is a young information security specialist from India. He has a keen interest in the field of hacking and network security and has adopted this field as full-time employment. He is the author of Metasploit Penetration Testing Cookbook , Packt Publishing , a book dealing with pen-testing using the most widely -used framework. Abhinav's work has been quoted in several portals and technology magazines. He is also an active contributor to the SecurityXploded community. He can be reached by mail at <>
or on Twitter at @abhinavbom
.
I would like to thank my grandparents for their blessings, my parents for their support, and my sister for being my perfect doctor.
Arif Jatmoko (MKom, CISSP, CISA, CCSP, CEH) is an IT Security Auditor at Bank Mandiri, Indonesia, and a private pentester for a few government projects. Prior to joining the bank, Arif had spent over 15 years working as a computer security specialist, computer forensicist, and malware analyst. From the early stages of his career, he has been working with top Fortune 500 companies as an IT security officer and has run several pentest projects for government and military institutions.
Now, he is working on a research about protocol reverse- engineering related to application systems within financial transactions such as banking.
Lee Allen is currently the Vulnerability Management Program lead for one of the Fortune 500 countries.
Lee is also the owner of miDgames.com, which is dedicated to bridging the gap between learning and fun by providing 3D video games that teach and reinforce complex subjects such as Linux command-line and penetration-testing skills.
Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide , Packt Publishing .
You might want to visit www.PacktPub.com for support files and downloads related to your book.
Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.
At www.PacktPub.com, you can also read a collection of free technical articles, sign up for a range of free newsletters and receive exclusive discounts and offers on Packt books and eBooks.
http://PacktLib.PacktPub.com
Do you need instant solutions to your IT questions? PacktLib is Packt's online digital book library. Here, you can access, read and search across Packt's entire library of books.
- Fully searchable across every book published by Packt
- Copy and paste, print and bookmark content
- On demand and accessible via web browser
If you have an account with Packt at www.PacktPub.com, you can use this to access PacktLib today and view nine entirely free books. Simply use your login credentials for immediate access.
This book is dedicated to Loredana for all of her support and understanding during the many nights of research and writing. Thank you.
This book is for the reader who wants to understand more about their wireless network, and how to use a software distribution such as BackTrack to be able to survey their wireless environment and select a robust and secure configuration.
, Installing and Configuring BackTrack , shows the reader how to install, configure, and customize BackTrack. At the end of this chapter, the reader will have a working and customized BackTrack application.
, Working with the Wireless Card , shows the reader how to work with the configuration and deal with the sometimes challenging task of getting their wireless card to work within BackTrack. At the end of this chapter, you will have a wireless card that works with the tools within BackTrack.
Font size:
Interval:
Bookmark:
Similar books «BackTrack: testing wireless network security»
Look at similar books to BackTrack: testing wireless network security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book BackTrack: testing wireless network security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.