Wireless Penetration Testing - El Fiky, Ahmed Hashem
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre44,41 €
Produit Neuf
Ou 11,10 € /mois
- Livraison à 0,01 €
- Livré entre le 14 et le 21 avril
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9789355512741_dbm
Nos autres offres
-
45,23 €
Produit Neuf
Ou 11,31 € /mois
- Livraison à 0,01 €
Expédition rapide et soignée depuis l`Angleterre - Délai de livraison: entre 10 et 20 jours ouvrés.
-
42,67 €
Produit Neuf
Ou 10,67 € /mois
- Livraison : 3,99 €
- Livré entre le 14 et le 18 avril
-
57,03 €
Produit Neuf
Ou 14,26 € /mois
- Livraison : 5,00 €
- Livré entre le 13 et le 17 avril
Exp¿di¿ en 7 jours ouvr¿s
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Wireless Penetration Testing Format Broché - Livre Informatique
0 avis sur Wireless Penetration Testing Format Broché - Livre Informatique
Donnez votre avis et cumulez 5
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Dragon Quest 8 - Guide Stratégique Officiel
23 avis
Occasion dès 42,15 €
-
Finance For Executives
Occasion dès 30,00 €
-
Maison Ikkoku Art Collection
6 avis
Occasion dès 35,00 €
-
Rehab Science: How To Overcome Pain And Heal From Injury
Neuf dès 58,00 €
-
Bill Brandt: Shadow & Light
Occasion dès 63,67 €
-
Larousse Menager Illustre 1926
Occasion dès 50,00 €
-
Helen Levitt
Neuf dès 49,70 €
Occasion dès 44,00 €
-
Karsh: A Biography In Images
Neuf dès 44,20 €
Occasion dès 42,57 €
-
Medardo Rosso: The Transient Form
Occasion dès 43,95 €
-
Crochet Moderne
Occasion dès 26,00 €
-
Introduction To Linear And Matrix Algebra
Occasion dès 43,61 €
-
The Lives Of Working Class Academics
Neuf dès 43,34 €
-
The Collected Poems Of Kenneth Koch
Neuf dès 47,65 €
-
Anglais - La Méthode Michel Thomas, Débutants Et Faux Débutants (7 Cd Audio)
6 avis
Neuf dès 75,00 €
Occasion dès 33,08 €
-
A Complete Set Of Khajuraho Sculpture
Occasion dès 30,90 €
-
Yngwie Malmsteen Anthology
Neuf dès 42,50 €
Occasion dès 25,00 €
-
Mission To Tibet: The Extraordinary Eighteenth-Century Account Of Father Ippolito Desideri S. J.
Neuf dès 39,24 €
Occasion dès 55,99 €
-
Writing The Book Of The World
Neuf dès 43,22 €
-
The Essential Guide To Color Knitting Techniques
Occasion dès 46,53 €
-
English For Everyone Course Book Level 3 Intermediate
1 avis
Neuf dès 23,60 €
Produits similaires
Présentation Wireless Penetration Testing Format Broché
- Livre Informatique
Résumé :
Examine, Attack, and Exploit Flaws and Vulnerabilities in Advanced Wireless Networks KEY FEATURES ? Extensive hands-on lab instructions in using Kali Linux to crack wireless networks. ? Covers the misconceptions, failures, and best practices that can help any pen tester come up with their special cyber attacks. ? Extensive coverage of Android and iOS pentesting, as well as attacking techniques and simulated attack scenarios. DESCRIPTION This book satisfies any IT professional's desire to become a successful ethical hacker who is willing to be employed in identifying and exploiting flaws in the organization's network environment. This book explains in detail how to conduct wireless penetration tests using a wide variety of tools to simulate cyber attacks on both Android and iOS mobile devices and wireless networks. This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng. Then, the book discusses the most recent and sophisticated cyberattacks that target access points and wireless devices and how to prepare a compelling and professionally presented report. As a bonus, it removes myths, addresses misconceptions, and corrects common misunderstandings that can be detrimental to one's professional credentials. Tips and advice that are easy to implement and can increase their marketability as a pentester are also provided, allowing them to quickly advance toward a satisfying career in the field. WHAT YOU WILL LEARN ? Learn all about breaking the WEP security protocol and cracking authentication keys. ? Acquire the skills necessary to successfully attack the WPA/WPA2 protocol. ? Compromise the access points and take full control of the wireless network. ? Bring your laptop up to speed by setting up Kali Linux and a wifi adapter. ? Identify security flaws and scan for open wireless LANs. ? Investigate the process and steps involved in wireless penetration testing. WHO THIS BOOK IS FOR This book is primarily for pentesters, mobile penetration testing users, cybersecurity analysts, security engineers, and all IT professionals interested in pursuing a career in cybersecurity. Before diving into this book, familiarity with network security fundamentals is recommended....
Biographie:
Ahmed Hashem has done his Masters in Cyber Security. Currently, he is enrolled in the Doctor of Business Administration Program. He has a total of 8+ years of experience in various domains such as Reverse Engineering, Malware Analysis, Web Penetration Testing, Mobile Penetration Testing, Network Penetration Testing, Wireless Penetration Testing, System Penetration Testing, and Machine Learning....
Sommaire:
Ahmed Hashem has done his Masters in Cyber Security. Currently, he is enrolled in the Doctor of Business Administration Program. He has a total of 8+ years of experience in various domains such as Reverse Engineering, Malware Analysis, Web Penetration Testing, Mobile Penetration Testing, Network Penetration Testing, Wireless Penetration Testing, System Penetration Testing, and Machine Learning....
Détails de conformité du produit
Personne responsable dans l'UE