- Paperback: 384 pages
- Publisher: For Dummies; 1 edition (September 13, 2005)
- Language: English
- ISBN-10: 0764597302
- ISBN-13: 978-0764597305
- Product Dimensions: 7.4 x 0.8 x 9.3 inches
- Shipping Weight: 1.8 pounds (View shipping rates and policies)
- Average Customer Review: 15 customer reviews
- Amazon Best Sellers Rank: #1,237,676 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hacking Wireless Networks For Dummies 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
See the Best Books of 2017
Looking for something great to read? Browse our editors' picks for the best books of the year in fiction, nonfiction, mysteries, children's books, and much more.
Frequently bought together
Customers who bought this item also bought
From the Back Cover
Become a cyber-hero know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.
Discover how to
- Perform ethical hacks without compromising a system
- Combat denial of service and WEP attacks
- Understand how invaders think
- Recognize the effects of different hacks
- Protect against war drivers and rogue devices
About the Author
Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response.
Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
I am astonished at how many positive reviews this horrible, stinky title has received ... how many friends do this guys have? In fact this has got to be one of the worst tech book I have ever read, a total waste of money and paper.
My advice is , avoid this book, and any other book form the same authors, like plague! You will learn NOTHING from them.
The authors go on and on babbling about how unsecure wireless networks are, and are nonetheless unable to clearly indicate you any technique to take advantage or to protect form this weakness. All you get (apart from the boring and repetitive author's ruminations) are a few screenshots of NetStumbler (hey man, I can see by myself what it looks like, teach me how to use it instead ..), one screenshot of Kismet running on a linux xterm and a list of some of its command options (come on do you think that a beginner would ever be able to figure out how to use a open source tool like Kismet all by himself?)
Ah we also get a little advertisement for a couple of non-free tools like AiroPeek ... like a beginner should spend money on that? And , wait, there is no tutorial or intro on those tools as well. Just the usual couple of screenshots to make the book look good if you flip through it at the bookstore.
Seriously, I know this is hard to believe, but this pathetic excuse for a book is just a series of boring trivialities
For example ... did you ever think about the fact that installing a non-authorized, non-encrypted access point in your office network might actually be a security risk? I am sure you didn't, but thanks to this beautiful book you know, as the author spends pages and pages rambling and babbling about this absurd topic!
Years ago the "For Dummies" series used to be the right choice if you needed a humorous, tutorial-like but solid intro to a 'foreign' technology, but now the title is not a joke anymore.
"Hacking Wireless Networks for Dummies".. true to its title!
They touch on the advanced things but don't explain enough for you to really fully realize the potential of anything. It's sort of like going into a suntan studio with a 3/4 raincoat on. You might get something out of being there but not enough for it to really be useful.
This book is no exception.
While it does touch on things such as ARP poisoning and Net Stumbler as well as some other useful starting points, it leaves a lot to be desired when it comes to expanding enough to make things worthwhile. It's a good introduction book but if you're planning on doing some real penetrations or penetration testing there are better books suited for this.
I would call this one a pre-reference reference book. At best.