000 -LEADER |
fixed length control field |
05951cam a2200361 a 4500 |
001 - CONTROL NUMBER |
control field |
u8308 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
SA-PMU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20210418123828.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
070827s2007 nyua 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2007035664 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Modifying agency |
YDX |
-- |
DPE |
-- |
XVF |
-- |
BAKER |
-- |
IXA |
-- |
QBX |
-- |
UKM |
-- |
OMP |
-- |
YDXCP |
-- |
BTCTA |
-- |
UUS |
-- |
MVCLD |
-- |
HEBIS |
-- |
HDC |
-- |
OCLCF |
-- |
OCLCO |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780072262582 (pbk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
0072262583 (pbk.) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)123415793 |
Canceled/invalid control number |
(OCoLC)76935566 |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5103.2 |
Item number |
.C23 2007 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.382 |
Edition number |
22 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Cache, Johnny. |
245 10 - TITLE STATEMENT |
Title |
Hacking exposed wireless : |
Remainder of title |
wireless security secrets & solutions / |
Statement of responsibility, etc. |
Johnny Cache, Vincent Liu. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York, NY : |
Name of publisher, distributor, etc. |
McGraw-Hill, |
Date of publication, distribution, etc. |
c2007. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxv, 387 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 00 - FORMATTED CONTENTS NOTE |
Title |
Case Study: BuzzCorp |
Miscellaneous information |
2 -- |
Title |
Wireless Setup |
Miscellaneous information |
2 -- |
Title |
Wireless Risks and Security Controls |
Miscellaneous information |
2 -- |
-- |
1 |
Title |
Wireless Security Overview |
Miscellaneous information |
3 -- |
Title |
Use and Spread of Wireless Technologies |
Miscellaneous information |
4 -- |
Title |
A Brief History of Wireless Technologies |
Miscellaneous information |
5 -- |
Title |
Basics of Wireless Technologies |
Miscellaneous information |
5 -- |
Title |
What Is Wireless? |
Miscellaneous information |
5 -- |
Title |
Standardization and Regulation |
Miscellaneous information |
6 -- |
Title |
Further Coverage |
Miscellaneous information |
7 -- |
Title |
The Risks of Wireless Technologies |
Miscellaneous information |
7 -- |
Title |
Advances in Wireless Security |
Miscellaneous information |
10 -- |
-- |
2 |
Title |
Radio Frequency |
Miscellaneous information |
13 -- |
Title |
RF Terminology |
Miscellaneous information |
14 -- |
Title |
Communications Systems |
Miscellaneous information |
14 -- |
Title |
Radio Frequency Signals |
Miscellaneous information |
17 -- |
Title |
Electromagnetic Waves |
Miscellaneous information |
19 -- |
Title |
Units of Measure |
Miscellaneous information |
20 -- |
Title |
Modulation |
Miscellaneous information |
24 -- |
Title |
Spread Spectrum and Multiplexing |
Miscellaneous information |
31 -- |
Title |
RF Hardware |
Miscellaneous information |
35 -- |
Title |
Antennas |
Miscellaneous information |
36 -- |
Title |
Amplifiers |
Miscellaneous information |
41 -- |
Title |
Government Regulations |
Miscellaneous information |
43 -- |
Title |
Wireless Standards |
Miscellaneous information |
44 -- |
Title |
Wireless LAN (802.11 a/b/g/n) |
Miscellaneous information |
45 -- |
-- |
Part II |
Title |
Hacking 802.11 Wireless Technology -- |
-- |
Case Study: Riding the Insecure Airwaves |
Miscellaneous information |
52 -- |
Title |
802.11 History |
Miscellaneous information |
54 -- |
Title |
Wi-Fi vs. 802.11 |
Miscellaneous information |
55 -- |
Title |
802.11 in a Nutshell |
Miscellaneous information |
55 -- |
Title |
The 802.11 MAC |
Miscellaneous information |
55 -- |
Title |
Features of the 802.11 MAC |
Miscellaneous information |
56 -- |
Title |
802.11 Packet Types |
Miscellaneous information |
61 -- |
Title |
Control Packets |
Miscellaneous information |
61 -- |
Title |
Management Packets |
Miscellaneous information |
62 -- |
Title |
Data Packets |
Miscellaneous information |
63 -- |
Title |
Addressing in 802.11 Packets |
Miscellaneous information |
63 -- |
Title |
Interesting Fields Across Packets |
Miscellaneous information |
64 -- |
Title |
Finding and Connecting to Wireless Networks |
Miscellaneous information |
66 -- |
Title |
Locating Wireless Networks |
Miscellaneous information |
66 -- |
Title |
Connecting to a Wireless Network |
Miscellaneous information |
67 -- |
Title |
WPA/802.11i Background |
Miscellaneous information |
68 -- |
Title |
802.11i Groundwork |
Miscellaneous information |
69 -- |
Title |
Extensible Authentication Protocol (EAP) |
Miscellaneous information |
70 -- |
Title |
802.1X: Bringing EAP to the LAN |
Miscellaneous information |
76 -- |
Title |
802.11i: Putting It All Together |
Miscellaneous information |
78 -- |
Title |
Authentication Using 802.11i |
Miscellaneous information |
78 -- |
Title |
Confidentiality in 802.11i |
Miscellaneous information |
84 -- |
Title |
Integrity in 802.11i |
Miscellaneous information |
87 -- |
Title |
Replay Protection in 802.11i |
Miscellaneous information |
88 -- |
-- |
4 |
Title |
802.11 Discovery |
Miscellaneous information |
91 -- |
Title |
Discovery Basics |
Miscellaneous information |
92 -- |
Title |
Hardware and Drivers |
Miscellaneous information |
98 -- |
Title |
Chipsets |
Miscellaneous information |
101 -- |
Title |
Cards |
Miscellaneous information |
104 -- |
Title |
Drivers |
Miscellaneous information |
106 -- |
Title |
Antennas |
Miscellaneous information |
117 -- |
Title |
GPS |
Miscellaneous information |
120 -- |
-- |
5 |
Title |
Scanning and Enumerating 802.11 Networks |
Miscellaneous information |
125 -- |
Title |
Choosing an Operating System |
Miscellaneous information |
126 -- |
Title |
Windows |
Miscellaneous information |
126 -- |
Title |
Linux |
Miscellaneous information |
126 -- |
Title |
OS X |
Miscellaneous information |
127 -- |
Title |
Windows Discovery Tools |
Miscellaneous information |
127 -- |
Title |
NetStumbler |
Miscellaneous information |
127 -- |
Title |
AiroPeek |
Miscellaneous information |
140 -- |
Title |
Linux Discovery Tools |
Miscellaneous information |
146 -- |
Title |
Kismet |
Miscellaneous information |
147 -- |
Title |
Wellenreiter |
Miscellaneous information |
153 -- |
Title |
OS X Discovery Tools |
Miscellaneous information |
154 -- |
Title |
Kismac |
Miscellaneous information |
154 -- |
Title |
MacStumbler |
Miscellaneous information |
159 -- |
Title |
iStumbler |
Miscellaneous information |
160 -- |
Title |
Kismet on OS X |
Miscellaneous information |
161 -- |
Title |
Online Mapping Services (wigle, .kismac, Google Earth) |
Miscellaneous information |
161 -- |
Title |
Network Identifiers |
Miscellaneous information |
162 -- |
Title |
UNIX Sniffers |
Miscellaneous information |
163 -- |
Title |
Displaying a Saved pcap File |
Miscellaneous information |
164 -- |
Title |
Capturing Packets in Real-Time |
Miscellaneous information |
164 -- |
Title |
Wireshark Colors |
Miscellaneous information |
165 -- |
-- |
6 |
Title |
Attacking 802.11 Networks |
Miscellaneous information |
167 -- |
Title |
Basic Types of Attacks |
Miscellaneous information |
168 -- |
Title |
Security Through Obscurity |
Miscellaneous information |
168 -- |
Title |
Defeating WEP |
Miscellaneous information |
173 -- |
Title |
802.11 Authentication Types |
Miscellaneous information |
184 -- |
Title |
Shared Key Authentication |
Miscellaneous information |
184 -- |
Title |
Open Authentication |
Miscellaneous information |
184 -- |
Title |
802.1X Authentication |
Miscellaneous information |
185 -- |
Title |
Advanced Attacks Against WEP |
Miscellaneous information |
185 -- |
Title |
RC4 Encryption Primer |
Miscellaneous information |
185 -- |
Title |
Rogue APs |
Miscellaneous information |
188 -- |
Title |
How Windows Looks for Preferred Networks |
Miscellaneous information |
189 -- |
Title |
Other KARMA Improvements |
Miscellaneous information |
190 -- |
Title |
Attacking the Availability of Wireless Networks |
Miscellaneous information |
194 -- |
Title |
RTS/CTS Attacks |
Miscellaneous information |
195 -- |
Title |
Miscellaneous Wireless Attacks |
Miscellaneous information |
198 -- |
-- |
7 |
Title |
Attacking WPA-protected 802.11 Networks |
Miscellaneous information |
203 -- |
Title |
Breaking WPA/802.11i |
Miscellaneous information |
204 -- |
Title |
WPA/802.11i Background |
Miscellaneous information |
204 -- |
Title |
Attacking WPA/802.11i Enterprise Authentication |
Miscellaneous information |
212 -- |
Title |
EAP-TLS |
Miscellaneous information |
213 -- |
Title |
LEAP |
Miscellaneous information |
214 -- |
Title |
Tunneling EAP Techniques (PEAP/ EAP-TTLS) |
Miscellaneous information |
216 -- |
-- |
8 |
Title |
802.11 Defense |
Miscellaneous information |
225 -- |
Title |
Direct 802.11 Defenses |
Miscellaneous information |
226 -- |
Title |
WEP |
Miscellaneous information |
227 -- |
Title |
Deploying WPA/WPA2 Securely |
Miscellaneous information |
229 -- |
Title |
Avoiding Layer Two Security Altogether |
Miscellaneous information |
231 -- |
Title |
VPN Protocol Overview |
Miscellaneous information |
232 -- |
Title |
802.11 Intrusion Detection |
Miscellaneous information |
235 -- |
Title |
Configuring PEAP and FreeRadius |
Miscellaneous information |
236 -- |
Title |
Creating the Certificate Authority |
Miscellaneous information |
237 -- |
Title |
Creating the RADIUS Server's Certificate |
Miscellaneous information |
238 -- |
Title |
Configuring FreeRADIUS |
Miscellaneous information |
240 -- |
Title |
Starting Up the RADIUS Server |
Miscellaneous information |
244 -- |
Title |
Configuring the AP |
Miscellaneous information |
244 -- |
Title |
Configuring Windows XP Clients |
Miscellaneous information |
244 -- |
Title |
Configuring OS X Clients |
Miscellaneous information |
249 -- |
Title |
Configuring Linux for PEAP Authentication |
Miscellaneous information |
250 -- |
Title |
Common RADIUS Configuration Problems |
Miscellaneous information |
251 -- |
-- |
Part III |
Title |
Hacking Additional Wireless Technologies -- |
-- |
Case Study: PriorApproval |
Miscellaneous information |
256 -- |
-- |
9 |
Title |
Hacking Hotspots |
Miscellaneous information |
261 -- |
Title |
Enumeration |
Miscellaneous information |
263 -- |
Title |
Identifying Hotspot Clients |
Miscellaneous information |
264 -- |
Title |
Hacking the Infrastructure |
Miscellaneous information |
267 -- |
Title |
Client Attacks |
Miscellaneous information |
274 -- |
-- |
10 |
Title |
The Potential Threat of Bluetooth |
Miscellaneous information |
287 -- |
Title |
What Is Bluetooth? |
Miscellaneous information |
288 -- |
Title |
How Far Does Bluetooth Reach? |
Miscellaneous information |
288 -- |
Title |
What Sort of Functionality Does Bluetooth Have? |
Miscellaneous information |
289 -- |
Title |
Problems with Bluetooth Security |
Miscellaneous information |
289 -- |
-- |
11 |
Title |
Advanced Attacks |
Miscellaneous information |
333 -- |
Title |
Layer 2 Fragmentation |
Miscellaneous information |
334 -- |
Title |
Breaking the Silence |
Miscellaneous information |
336 -- |
Title |
Layer 2 and Layer 3 Resolution |
Miscellaneous information |
336 -- |
Title |
IP |
Miscellaneous information |
337 -- |
Title |
UDP |
Miscellaneous information |
342 -- |
Title |
TCP |
Miscellaneous information |
342 -- |
Title |
Device Driver Vulnerabilities |
Miscellaneous information |
353. |
596 ## - |
-- |
1 2 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless communication systems |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Wireless LANs |
General subdivision |
Security measures. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Liu, Vincent. |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Contributor biographical information |
Uniform Resource Identifier |
<a href="http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-b.html">http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-b.html</a> |
856 42 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Publisher description |
Uniform Resource Identifier |
<a href="http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-d.html">http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-d.html</a> |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
Table of contents only |
Uniform Resource Identifier |
<a href="http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-t.html">http://catdir.loc.gov/catdir/enhancements/fy0814/2007035664-t.html</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Books |
994 ## - |
-- |
Z0 |
-- |
SUPMU |