The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.
- Explains how the wireless access points in common, everyday devices can expose us to hacks and threats
- Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data
- Presents concrete examples and real-world guidance on how to protect against wireless access point attacks
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.