Author: Chris Hurley
Publisher: Elsevier
ISBN: 008048168X
Category : Computers
Languages : en
Pages : 521
Book Description
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.* Provides the essential information needed to protect and secure wireless networks* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks* This is the first book to deal with the hot topic of WarDriving
WarDriving: Drive, Detect, Defend
Author: Chris Hurley
Publisher: Elsevier
ISBN: 008048168X
Category : Computers
Languages : en
Pages : 521
Book Description
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.* Provides the essential information needed to protect and secure wireless networks* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks* This is the first book to deal with the hot topic of WarDriving
Publisher: Elsevier
ISBN: 008048168X
Category : Computers
Languages : en
Pages : 521
Book Description
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.* Provides the essential information needed to protect and secure wireless networks* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks* This is the first book to deal with the hot topic of WarDriving
WarDriving: Drive Detect Defend: A Guide to Wireless Security
Author: Chris Hurley
Publisher:
ISBN: 9788173668845
Category : Computer security
Languages : en
Pages : 524
Book Description
Publisher:
ISBN: 9788173668845
Category : Computer security
Languages : en
Pages : 524
Book Description
Hardware Hacking
Author: Joe Grand
Publisher: Elsevier
ISBN: 0080478255
Category : Computers
Languages : en
Pages : 575
Book Description
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB· Includes hacks of today's most popular gaming systems like Xbox and PS/2.· Teaches readers to unlock the full entertainment potential of their desktop PC.· Frees iMac owners to enhance the features they love and get rid of the ones they hate.
Publisher: Elsevier
ISBN: 0080478255
Category : Computers
Languages : en
Pages : 575
Book Description
"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB· Includes hacks of today's most popular gaming systems like Xbox and PS/2.· Teaches readers to unlock the full entertainment potential of their desktop PC.· Frees iMac owners to enhance the features they love and get rid of the ones they hate.
Apple I Replica Creation
Author: Tom Owad
Publisher: Elsevier
ISBN: 008049921X
Category : Computers
Languages : en
Pages : 369
Book Description
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by discussing the functionality of the 9 chip on the Apple I motherboard. From there, readers will be taught the basics of memory access and video input and output. Readers then learn how to assemble the various hardware components into a fully functioning Apple I replica. Finally, readers will learn how to write their own applications to take run on their new/old computer.*Written by the webmaster of AppleFritter.com, which is the most popular Mac hobbyist Web site on the internet with over 10,000 visitors a day. *Interest in vintage Apple I Computers is extremely high, with original machines selling for as much as $50,000. *The only modern-day book to address general microcomputer design from a hobbyist perspective
Publisher: Elsevier
ISBN: 008049921X
Category : Computers
Languages : en
Pages : 369
Book Description
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design. The book will begin by teaching readers the basics of computer processing by discussing the functionality of the 9 chip on the Apple I motherboard. From there, readers will be taught the basics of memory access and video input and output. Readers then learn how to assemble the various hardware components into a fully functioning Apple I replica. Finally, readers will learn how to write their own applications to take run on their new/old computer.*Written by the webmaster of AppleFritter.com, which is the most popular Mac hobbyist Web site on the internet with over 10,000 visitors a day. *Interest in vintage Apple I Computers is extremely high, with original machines selling for as much as $50,000. *The only modern-day book to address general microcomputer design from a hobbyist perspective
Managing and Securing a Cisco Structured Wireless-Aware Network
Author: David Wall
Publisher: Elsevier
ISBN: 0080479030
Category : Computers
Languages : en
Pages : 498
Book Description
Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, Managing and Securing a Cisco Structured Wireless-Aware Network also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE). - Emphasis on AUTOMATING and SIMPLIFYING the management of mixed environment (wired and wireless) networks - Describes how to centralized control and configuration of thousands of networking devices - Security blueprint to help detect rogue access points and achieve fast, secure roaming for mobile applications
Publisher: Elsevier
ISBN: 0080479030
Category : Computers
Languages : en
Pages : 498
Book Description
Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, Managing and Securing a Cisco Structured Wireless-Aware Network also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE). - Emphasis on AUTOMATING and SIMPLIFYING the management of mixed environment (wired and wireless) networks - Describes how to centralized control and configuration of thousands of networking devices - Security blueprint to help detect rogue access points and achieve fast, secure roaming for mobile applications
The Mezonic Agenda: Hacking the Presidency
Author: Herbert Thomson
Publisher: Elsevier
ISBN: 0080479405
Category : Computers
Languages : en
Pages : 402
Book Description
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book. * To be published in October 2004 when interest in the American Presidential election will be at its highest. * Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
Publisher: Elsevier
ISBN: 0080479405
Category : Computers
Languages : en
Pages : 402
Book Description
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.* The first cyber-thriller" that allows the reader to "hack along" using the accompanying CD which contains working versions of all the applications described in the book. * To be published in October 2004 when interest in the American Presidential election will be at its highest. * Provides IT professionals with the most advanced, timely, and accurate information available on security exploits in a fascinating, fictional narrative.
Stealing the Network: How to Own an Identity
Author: Ryan Russell
Publisher: Elsevier
ISBN: 0080517749
Category : Computers
Languages : en
Pages : 361
Book Description
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Publisher: Elsevier
ISBN: 0080517749
Category : Computers
Languages : en
Pages : 361
Book Description
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Richard Thieme's Islands in the Clickstream
Author: Richard Thieme
Publisher: Elsevier
ISBN: 0080480705
Category : Computers
Languages : en
Pages : 358
Book Description
CNN called Richard Thieme "a member of the cyber avant-garde". Digital Delirium named him "one of the most creative minds of the digital generation". Now Richard Thieme's wisdom on the social and cultural dimensions of technology is available in a single volume. "Islands in the Clickstream" ranges beyond the impact of technology to spirituality, psychological insight, and social commentary. Now that people are used to living in virtual worlds and move easily between online and offline worlds, they want to connect that experience to the deeper issues of our lives, including spiritual issues. Some examples include "Dreams Engineers Have", "The Crazy Lady on the Treadmill", and "Whistleblowers and Team Players". These essays raise serious questions for thoughtful readers. They have attracted favorable commentary from around the world and a fanatic, almost rabid fan base.* This author has become an extremely popular and highly visible talking head. He is a rare "personality" in the otherwise bland world of technology commentators.* The book leverages the loyalty of his audience in the same way Bill O'Reilly's "The O'Reilly Factor" and Al Franken's "Lies and the Lying Liars Who Tell Them" do.* The book is an easy read intended to provoke thought, discussion and disagreement.
Publisher: Elsevier
ISBN: 0080480705
Category : Computers
Languages : en
Pages : 358
Book Description
CNN called Richard Thieme "a member of the cyber avant-garde". Digital Delirium named him "one of the most creative minds of the digital generation". Now Richard Thieme's wisdom on the social and cultural dimensions of technology is available in a single volume. "Islands in the Clickstream" ranges beyond the impact of technology to spirituality, psychological insight, and social commentary. Now that people are used to living in virtual worlds and move easily between online and offline worlds, they want to connect that experience to the deeper issues of our lives, including spiritual issues. Some examples include "Dreams Engineers Have", "The Crazy Lady on the Treadmill", and "Whistleblowers and Team Players". These essays raise serious questions for thoughtful readers. They have attracted favorable commentary from around the world and a fanatic, almost rabid fan base.* This author has become an extremely popular and highly visible talking head. He is a rare "personality" in the otherwise bland world of technology commentators.* The book leverages the loyalty of his audience in the same way Bill O'Reilly's "The O'Reilly Factor" and Al Franken's "Lies and the Lying Liars Who Tell Them" do.* The book is an easy read intended to provoke thought, discussion and disagreement.
Hacking a Terror Network: The Silent Threat of Covert Channels
Author: Russ Rogers
Publisher: Elsevier
ISBN: 0080488889
Category : Computers
Languages : en
Pages : 401
Book Description
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
Publisher: Elsevier
ISBN: 0080488889
Category : Computers
Languages : en
Pages : 401
Book Description
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to "hack along" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to "hack along" with the fictional narrative within the book to decrypyt.
WarDriving and Wireless Penetration Testing
Author: Chris Hurley
Publisher: Syngress
ISBN: 9781597491112
Category : Computers
Languages : en
Pages : 452
Book Description
"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
Publisher: Syngress
ISBN: 9781597491112
Category : Computers
Languages : en
Pages : 452
Book Description
"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.