Index
 
Operating Systems
Java
Programming Languages
Hardware
Microsoft Technologies
Computer Science
Database
Network
Software Engineering
XML and XSL
Internet
Web Programming
Web Technologies
Physics
Bio-Chemistry
Mathematics
Medical
Redbooks
Unlisted/Miscellaneous

Contact Us

Freebookzone.com | What's New | Missing Link | Feedback

Internet



Book Title : Maximum Wireless Security
eBook download format(s) : chm
ISBN-10 : 0672324881 
ISBN-13 : 978-0-672324-88-8 
Author(s) : Cyrus Peikari Seth Fogie 
Publisher : Sams (18 Dec 2002)
Section : Internet
Book Review:

Book Description

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code, real-world case studies, and step-by-step configuration recipes.

The book includes detailed, hands-on information that is currently unavailable in any printed text -- information that has been gleaned from the authors' work with real wireless hackers ("war drivers"), wireless security developers, and leading security experts.




add to del.icio.us                 Digg Freebookzone.com!

You may use anyone of the download options


eBook VersionBuy this book from Amazon
Front Cover

Missing Link?, Report It and you may wish to  Buy  this book from amazon

Tell a Friend!

Similar Book titles in Internet section:
Practical UNIX & Internet Security
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Computer Security Basics 2nd Edition
Writing Security Tools And Exploits
The Information Security Dictionary: Defining the Terms that Define Security for E-Business, Internet, Information and Wireless Technology


Similar Book titles in Other sections:

Section: Java Micro Edition
Learning Wireless Java


Section: Java Networking
JAVA 2 Network Security


Section: Miscellaneous
Handbook of Information Security Management


Section: Microsoft .(dot) net
The .NET Developer's Guide to Windows Security
Improving Web Application Security: Threats and Countermeasures


Section: Networking
Introduction to Computer, Internet & Network Systems Security
Wireless Networking Handbook
Cisco - Designing Network Security
Cisco Secure Internet Security Solutions
Router Security Configuration Guide
Show all..


Section: GNU/Linux OS
Maximum RPM
Security in Open Systems
The Linux Administrator's Security Guide
Get Acquainted with Linux Security and Optimization System
Linux Security for Beginners
Show all..


Section: Mac OS X
Maximum Mac OS X Security


Section: C++ Language
Wireless Game Development in C/C++ with BREW


Section: Redbooks Draft
Enterprise Security Architecture using IBM ISS Security Solutions
Enterprise Security Architecture Using IBM Tivoli Security Solutions
WebSphere Application Server V6.1 Security Handbook
Understanding SOA Security Design and Implementation
Communications Server for z/OS V1R8 TCP/IP Implementation Volume 4: Policy-based Network Security
Show all..


Section: Redbooks
Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
Enterprise Security Architecture Using IBM Tivoli Security Solutions
Security for Linux on System z
AIX V6 Advanced Security Features Introduction and Configuration
Show all..


Section: Redpapers
WebSphere Application Server on z/OS and Security Integration
Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS
J2C Security on z/OS
Java Message Service (JMS) Security on z/OS
z/OS UNIX Security Fundamentals
Show all..


Section: Redpapers Draft
Improving your WebApplication Software Development Life Cycle's Security Posture with IBM Rational AppScan
IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide
JKE Case Study: SOA Security and Management Scenario SOA Scenario
Case Study: SOA Security and Management Scenario SOA Scenario
Integrating WebSphere Service Registry and Repository with Tivoli Security Policy Manager
Show all..


Section: XML, XSL & UML
Softsteel Wireless Markup Language (WML) Tutorial


Similar Books from Amazon :


Tell a Friend!


©2008 FreeBookZone.com - Home - Privacy Policy - Program Policy, Terms and Conditions