Seven deadliest wireless technologies attacks /
By: Haines, Brad
Title By: Kramer, Tim
Material type:![](/opac-tmpl/lib/famfamfam/BK.png)
Item type | Home library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
REGULAR | University of Wollongong in Dubai Main Collection | 005.8 HA SE (Browse shelf) | Available | T0043502 |
Total holds: 0
, Shelving location: Main Collection Close shelf browser
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 HA ND Handbook of security and networks / | 005.8 HA ND Handbook of research on secure multimedia distribution / | 005.8 HA ND Handbook of system safety and security : | 005.8 HA SE Seven deadliest wireless technologies attacks / | 005.8 HO WT How to cheat at securing your network / | 005.8 HU AT Attribute-based access control / | 005.8 HU CC CCNP security firewall 642-618 official cert guide |
Includes bibliographical references and index.
802.11 wireless--infrastructure attacks -- Wireless--client attacks -- Bluetooth attacks -- Radio frequency identification attacks -- Analog wireless devices -- Bad encryption -- Cell phones, personal digital assistants, and other hybrid devices.