Jump to ratings and reviews
Rate this book

Seven Deadliest Wireless Technologies Attacks

Rate this book
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers. Attacks detailed in this book

160 pages, Paperback

First published January 1, 2010

1 person is currently reading
11 people want to read

About the author

Brad Haines

6 books2 followers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
1 (14%)
4 stars
2 (28%)
3 stars
4 (57%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
Profile Image for Robin Redden.
313 reviews2 followers
February 3, 2018
Good overall intro to various wireless technologies and their vulnerabilities. Includes chapters on WI-FI, bluetooth, analog, cellular, RFID and encryption. Clearly written and discusses the how of attacks and the preventions/protections that can be utilized against these attacks.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.