"Sinopsis" puede pertenecer a otra edición de este libro.
"Sobre este título" puede pertenecer a otra edición de este libro.
Gastos de envío:
EUR 3,69
A Estados Unidos de America
Descripción Paperback. Condición: new. New. Fast Shipping and good customer service. Nº de ref. del artículo: Holz_New_159749111X
Descripción Paperback. Condición: new. New Copy. Customer Service Guaranteed. Nº de ref. del artículo: think159749111X
Descripción Paperback. Condición: new. Brand New Copy. Nº de ref. del artículo: BBB_new159749111X
Descripción Condición: New. Nº de ref. del artículo: ABLIING23Mar2811580097192
Descripción Condición: New. New! This book is in the same immaculate condition as when it was published 1.92. Nº de ref. del artículo: 353-159749111X-new
Descripción Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Nº de ref. del artículo: ria9781597491112_lsuk
Descripción PF. Condición: New. Nº de ref. del artículo: 6666-IUK-9781597491112
Descripción Paperback. Condición: New. Nº de ref. del artículo: XH-020
Descripción Paperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Nº de ref. del artículo: C9781597491112
Descripción Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks. Nº de ref. del artículo: 9781597491112