Hacking Exposed Wireless, Second Edition and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $49.99
  • Save: $16.14 (32%)
FREE Shipping on orders over $35.
Only 16 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Used: Good | Details
Sold by RentU
Condition: Used: Good
Comment: Fast shipping from Amazon! Qualifies for Prime Shipping and FREE standard shipping for orders over $35. Overnight, 2 day and International shipping available! Excellent Customer Service.. May not include supplements such as CD, access code or DVD.
Access codes and supplements are not guaranteed with used items.
Sell yours for a Gift Card
We'll buy it for $2.81
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Exposed Wireless: Wireless Security Secrets & Colutions Paperback – July 9, 2010

ISBN-13: 978-0071666619 ISBN-10: 0071666613 Edition: 2nd

Buy New
Price: $33.85
30 New from $19.08 20 Used from $11.00
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$33.85
$19.08 $11.00
12%20Days%20of%20Deals%20in%20Books

Frequently Bought Together

Hacking Exposed Wireless: Wireless Security Secrets & Colutions + Hacking Exposed 7: Network Security Secrets &Amp; Solutions (Hacking Exposed: Network Security Secrets & Solutions)
Price for both: $65.37

Buy the selected items together
NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Series: Hacking Exposed
  • Paperback: 484 pages
  • Publisher: Mcgraw-Hill Osborne Media; 2 edition (July 9, 2010)
  • Language: English
  • ISBN-10: 0071666613
  • ISBN-13: 978-0071666619
  • Product Dimensions: 7.4 x 1 x 9.1 inches
  • Shipping Weight: 1.9 pounds (View shipping rates and policies)
  • Average Customer Review: 4.6 out of 5 stars  See all reviews (8 customer reviews)
  • Amazon Best Sellers Rank: #529,767 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Johnny Cache is the author of many wireless tools and has spoken at several security conferences, including BlackHat, BlueHat, and ToorCon.

Joshua Wright is a senior security analyst with InGuardians Inc., an information security research and consulting firm, and a senior instructor and author with the SANS Institute. He continually looks for new ways to break wireless networks.

Vincent Liu is the Managing Director at Stach & Liu, a security consulting firm providing services to Fortune 500 companies, global financial institutions, and U.S. and foreign governments.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

4.6 out of 5 stars
5 star
7
4 star
0
3 star
0
2 star
1
1 star
0
See all 8 customer reviews
These guys have really done a superb job.
Devin Akin
Think of this book as a "gateway," arming you with the knowledge needed to begin a new career/hobby/whatever.
Andrew
I own every hacking exposed book ever printed that i am aware of.
drake

Most Helpful Customer Reviews

31 of 32 people found the following review helpful By Richard Bejtlich on September 2, 2010
Format: Paperback
I reviewed the first edition of Hacking Exposed: Wireless (HEW) in May 2007, and offered four stars. Three years later I can confidently say that Hacking Exposed: Wireless, 2nd Ed (HEW2) is a solid five star book. After reading my 2007 review, I believe the authors took my suggestions seriously, and those of other reviewers, and produced HEW2, the best book on wireless security available. If you want to understand wireless -- and not just 802.11, but also Bluetooth, ZigBee, and DECT -- HEW2 is the book for you.

Books in the Hacking Exposed (HE) series that implement the winning HE formula do the following: 1) explain a technology, including aspects you may have never heard of before; 2) explain how to break that technology; and 3) explain how to mitigate the attack, if possible. HEW2 uses this methodology and the result is a great HE book. HEW2 is also cross-platform, usually providing advice on using Windows, Linux, or Mac OS X. Furthermore, this advice is exceptionally practical and relevant. The authors not only describe what works, but also what doesn't work. I got the sense that I was speaking with a pro who was willing to share tips from the trenches, not theory copied from a Web site.

Other aspects of HEW2 make it a winner. The authors post three free chapters on their Web site as background that they didn't want to include in the main text. Their Web site also contains code and other background material from the book, like pcap files. Although I am not on the front lines of wireless hacking, I got the sense that these authors do live on that edge. They explained Software Defined Radio, hardware specifically for attacking wireless devices, hardware mods, and other custom approaches that extend beyond normal wireless techniques.
Read more ›
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
18 of 18 people found the following review helpful By Andrew on November 6, 2010
Format: Paperback Verified Purchase
From a beginner's perspective, this book is great. It offers a broad introduction to 802.11, Bluetooth, ZigBee, and DECT theory, as well as scanning, enumeration, and exploitation techniques. Additionally, the first chapter does a great job of recommending various 802.11 wireless devices. The book's teaching format is not OS-specific either, as the authors will show how to use different applications in different OSs (i.e., using Chanelyzer in Windows, or Kismet in Linux).

What you should expect from this book is an INTRODUCTION to wireless hacking. Like I stated earlier, this book offers broad coverage of various techniques. The authors touch on different subjects, but they do not delve waste-deep into the details of them. Don't expect a WHOLE chapter dedicated to instruction on the aircrack-ng suite, but do expect enough instruction on how to start and run it. There are whole books and websites dedicated to teaching many of the programs covered in this one text.

The authors do a very good job of teaching you how to defeat different forms of wireless security (SSID hiding, MAC filtering, WEP, WPA, etc.). For example, a majority of the text moves in a very logical pattern - first, you learn how to scan and identify a target wireless network. You're then taught how to defeat MAC filtering (if it is in place). Afterwards, you move on to encryption cracking. Finally, you're taught a bit of exploitation.

Don't think that reading this book will turn you into a "master Wi-Fi cracking Jedi" - this mindset will only set you up for disappointment. Think of this book as a "gateway," arming you with the knowledge needed to begin a new career/hobby/whatever.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
9 of 9 people found the following review helpful By Eric Huber on January 7, 2011
Format: Paperback Verified Purchase
This book is a fabulous way to either introduce yourself to the world of wireless security or to sharpen your edge if you are already working in this area. The authors do a fine job of offering up a broad, but reasonably comprehensive view of the wireless security world ranging from frequently encountered technologies such as 802.11 to more exotic technologies such as ZigBee (a low powered, but high battery endurance wireless protocol used in products such as security systems and lighting controls). I had never even heard of ZigBee until I read this book, but now I understand it from a general technical perspective as well as a security perspective.

The authors follow a consistent template for each technology they discuss. They provide a detailed, but approachable overview of the technology and then explore the technology from both an offensive and defensive point of view. The authors have successfully struck a balance between explaining wireless security in an approachable manner and providing detailed hands on examples of interacting with a wide variety of tools. This makes the book a good resource for someone who might only be interested in wireless security from a high level such as an information security manager. However, it also makes the book a valuable resource for the practitioner who wishes to learn wireless security in a more hands on manner.

As an added bonus, the book includes a foreward by Ed Skoudis where Ed reveals that he has the soul of an electrical engineer. He further explains he was partially led to this discovery by a picture of Nikola Tesla shooting lighting-bolts out of his eyes. How can you pass up reading that?
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again