- Prime Student members get £10 off with a spend of £40 or more on Books. Enter code SAVE10 at checkout. Enter code SAVE10 at checkout. Here's how (terms and conditions apply)
Hacking Exposed Wireless, Second Edition: Wireless Security Secrets and Solutions Paperback – 1 Aug 2010
- Choose from over 13,000 locations across the UK
- Prime members get unlimited deliveries at no additional cost
- Find your preferred location and add it to your address book
- Dispatch to this address when you check out
There is a newer edition of this item:
Special offers and product promotions
Customers who viewed this item also viewed
What other items do customers buy after viewing this item?
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Would you like to tell us about a lower price?
If you are a seller for this product, would you like to suggest updates through seller support?
About the Author
Johnny Cache is the author of many wireless tools and has spoken at several security conferences, including BlackHat, BlueHat, and ToorCon.
Joshua Wright is a senior security analyst with InGuardians Inc., an information security research and consulting firm, and a senior instructor and author with the SANS Institute. He continually looks for new ways to break wireless networks.
Vincent Liu is the Managing Director at Stach & Liu, a security consulting firm providing services to Fortune 500 companies, global financial institutions, and U.S. and foreign governments.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I took a month break from my CCIE R&S study to follow this through.
I read it cover to cover, and practiced many of the examples (if not all of them).
What I liked was that if you read between the lines of what they are saying, you can understand the other nefarious uses of these skills, and thus best how to combat the 'attack'.
Really I just logged in here to see if there was an updated version to buy.
If you have no skills, or no desire to learn some *nix (Unix, Linux, Mac) you might struggle to follow some of the examples, as that is the hackers platform of choice, and thus features throughout the books' worked examples.
I was stopped in San Jose airport by airport security carrying this book, and all they wanted to say was 'good reading - enjoy it!'. It seems they had some of these skills already...
This is a great series, but come on guys take the DRM off, The only people you're inconveniencing are legitimate owners!
Would you like to see more reviews about this item?