- Save 10% on Books for Schools offered by Amazon.co.uk when you purchase 10 or more of the same book. Here's how (terms and conditions apply) Enter code SCHOOLS2016 at checkout. Here's how (terms and conditions apply)
Hacking Exposed Wireless, Second Edition: Wireless Security Secrets and Solutions Paperback – 1 Aug 2010
|New from||Used from|
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
There is a newer edition of this item:
Special Offers and Product Promotions
Customers Who Bought This Item Also Bought
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
About the Author
Johnny Cache is the author of many wireless tools and has spoken at several security conferences, including BlackHat, BlueHat, and ToorCon.
Joshua Wright is a senior security analyst with InGuardians Inc., an information security research and consulting firm, and a senior instructor and author with the SANS Institute. He continually looks for new ways to break wireless networks.
Vincent Liu is the Managing Director at Stach & Liu, a security consulting firm providing services to Fortune 500 companies, global financial institutions, and U.S. and foreign governments.
What Other Items Do Customers Buy After Viewing This Item?
Top Customer Reviews
I took a month break from my CCIE R&S study to follow this through.
I read it cover to cover, and practiced many of the examples (if not all of them).
What I liked was that if you read between the lines of what they are saying, you can understand the other nefarious uses of these skills, and thus best how to combat the 'attack'.
Really I just logged in here to see if there was an updated version to buy.
If you have no skills, or no desire to learn some *nix (Unix, Linux, Mac) you might struggle to follow some of the examples, as that is the hackers platform of choice, and thus features throughout the books' worked examples.
I was stopped in San Jose airport by airport security carrying this book, and all they wanted to say was 'good reading - enjoy it!'. It seems they had some of these skills already...
Most Recent Customer Reviews
The much-heralded companion website does not appear to be available any longer.Published 22 months ago by Joseph Khoury
I recently purchase a new Ipad mini tried to load this and another hacking exposed book on to the Kindle App, which told me that my licence has expired! Read morePublished on 25 Mar. 2013 by another reader