Non è necessario possedere un dispositivo Kindle. Scarica una delle app Kindle gratuite per iniziare a leggere i libri Kindle sul tuo smartphone, tablet e computer.

  • Apple
  • Android
  • Windows Phone
  • Android

Per scaricare una app gratuita, inserisci il numero di cellulare.

Prezzo edizione digitale: EUR 41,55
Prezzo Kindle: EUR 29,08

Risparmia EUR 13,87 (32%)

include IVA (dove applicabile)

Queste promozioni verranno applicate al seguente articolo:

Alcune promozioni sono cumulabili; altre non possono essere unite con ulteriori promozioni. Per maggiori dettagli, vai ai Termini & Condizioni delle specifiche promozioni.

Invia a Kindle o a un altro dispositivo

Invia a Kindle o a un altro dispositivo

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security di [Hurley, Chris]
Annuncio applicazione Kindle

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security 1st , Formato Kindle


Visualizza tutti i 2 formati e le edizioni Nascondi altri formati ed edizioni
Prezzo Amazon
Nuovo a partire da Usato da
Formato Kindle
"Ti preghiamo di riprovare"
EUR 29,08

Descrizione prodotto

Sinossi

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.

* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving

L'autore

Chris Hurley is a Senior Penetration Tester in the Washington, DC area. He has more than 10 years of experience performing penetration testing, vulnerability assessments, and general INFOSEC grunt work. He is the founder of the WorldWide WarDrive, a four-year project to assess the security posture of wireless networks deployed throughout the world. Chris was also the original organizer of the DEF CON WarDriving contest. He is the lead author of WarDriving: Drive, Detect, Defend (Syngress Publishing, ISBN: 19318360305). He has contributed to several other Syngress publications, including Penetration Tester's Open Source Toolkit (ISBN: 1-5974490210), Stealing the Network: How to Own an Identity (ISBN: 1597490067), InfoSec Career Hacking (ISBN: 1597490113), and OS X for Hackers at Heart (ISBN: 1597490407). He has a BS from Angelo State University in Computer Science and a whole bunch of certifications to make himself feel important.

Dettagli prodotto

  • Formato: Formato Kindle
  • Dimensioni file: 18995 KB
  • Lunghezza stampa: 512
  • Editore: Syngress; 1st edizione (2 aprile 2004)
  • Venduto da: Amazon Media EU S.à r.l.
  • Lingua: Inglese
  • ASIN: B003YCQ8U2
  • Da testo a voce: Abilitato
  • X-Ray:
  • Word Wise: Non abilitato
  • Miglioramenti tipografici: Non abilitato
  • Media recensioni: Recensisci per primo questo articolo
  • Hai trovato questo prodotto a un prezzo più basso?

Recensioni clienti

Non ci sono ancora recensioni di clienti su Amazon.it
5 stelle
4 stelle
3 stelle
2 stelle
1 stella

Le recensioni clienti più utili su Amazon.com (beta) (Potrebbero essere presenti recensioni del programma "Early Reviewer Rewards")

Amazon.com: 3.8 su 5 stelle 21 recensioni
5.0 su 5 stelle Five Stars 18 agosto 2014
Di Pete - Pubblicato su Amazon.com
Formato: Copertina flessibile Acquisto verificato
Great book
100 di 109 persone hanno trovato utile la seguente recensione
1.0 su 5 stelle Who ARE these people giving 5 star reviews? 21 maggio 2004
Di Anthony Sutton - Pubblicato su Amazon.com
Formato: Copertina flessibile Acquisto verificato
The short review of this book is that if you're interested enough in the subject to buy this book, then you're unlikely to find anything - and I mean ANYTHING - new in this book.
It takes two seperate chapters: one on installing the Windows utility Netstumbler (with pages and pages of screen shots, when a simple "click on the icon" would do), and one on using - not "advanced options" or anything, just using - Netstumbler. Similarly, three whole chapters are dedicated to the excruciating details of installation and use of the Linux tool Kismet, but again, nothing which couldn't be found in the README files or on the website which hosts the utility. They have a chapter on how to convert Kismet and Netstumbler logfiles to maps: if you already know about Stumbverter, WiGLE, and DiGLE (or can use Google), there's nothing new here. The authors pine on for a chapter about the wardrives that they've organized. If you've ever listened to your grandparents talk about the war, it's a lot like that. Then, they have a chapter on WiFi "attacks" - if you know how to manually set your SSID and MAC, and if you've ever even heard of Airsnort, you probably won't need this nontechnical, sub-script-kiddie, Windows screen-shot-laden chapter.
If you're interested in war driving, or if you're interested in Wi-Fi security, then you're probably already conversant with the tools covered in this book. There is no real technical depth, as this book is written to a "manager's level" of technical competence. ("Click OK to continue.") Their chapter on Wi-Fi network defense essentially boils down to "change default SSID" and "use WEP"; there's a couple of pages on VPN, firewalls, and using authentication, but again, nothing to justify the purchase price of this book.
2 di 2 persone hanno trovato utile la seguente recensione
3.0 su 5 stelle Interesting but not Secure 18 febbraio 2006
Di John Coale - Pubblicato su Amazon.com
Formato: Copertina flessibile
Wardriving is an interesting "how to" book on detecting and locating wireless communication systems. It points out their vulnerabilities and describes methods to secure them. Fairly basic stuff, but it takes several chapters to get to the good stuff. Although not for the novice, any amateur geek can buy or build the necessary equipment for a simple set up.

The book details how easy it is to legally detect and locate wireless nodes - and how easy it could be to illegally intercept wireless communications. It goes into way more technical detail than I wanted or needed to know, but provides even the expert with good reading. I found the contests and competitions interesting, reminding me of cyber or geo caching. It shows how unaware we are of the insecurity of our communications that we depend on daily. The security aspects are welcome but insufficient for complete protection. With the public concern over monitoring US communications in the news lately, this book will be timely to add to the confusion.

Although a helpful and interesting guide from Syngress, much more could be added to secure wireless systems.
9 di 11 persone hanno trovato utile la seguente recensione
3.0 su 5 stelle A decent book on a narrow but relevant topic 27 aprile 2004
Di Richard Bejtlich - Pubblicato su Amazon.com
Formato: Copertina flessibile
If you want to learn how to wardrive using Kismet or NetStumbler (and variants), "WarDriving" is for you. The book does a good job debunking certain myths, such as the prevalence of "warchalking" or the widespread use of "Pringles can antennas." I found the practical advice, like disabling the TCP/IP stack on Windows prior to wardriving, especially helpful. The authors constantly advocate a professional mindset towards wardriving and do not suggest unethical use of insecure wireless networks.

"WarDriving" suffers from several drawbacks. The book was written by multiple authors, and the lead author failed to remove redundant material. For example, ch. 3 repeats the advice and instructions found in ch. 1 regarding disabling Windows' TCP/IP stack. Ch. 3 also gives virtually the same advice on assembling wireless equipment, including more screenshots of gear and discussions of NetStumbler found in ch. 2. All of this should have been consolidated.
I did not find the majority of screen captures in the various "installation" chapters helpful. Why take up 1/3 of a page with an essentially blank screen capture that only features the "su -" command? All similar information could have been presented as inline text. Many other screen captures offered fonts that were too small to show meaningful details. For example, many of the Kismet shots in ch. 6 are mostly blank screens with small text stuffed into the top or corners. The author should have resized his terminal with capturing the screen in mind.
Technically, I found the book accurate. I was not happy to see MAC defined as "machine access code" in the first half of the book and as "media access control" in ch. 10. (The second expansion is the norm, although Asante oddly uses the first.) Although the book covered Kismet, NetStumbler, and derivatives, it did not feature bsd-airtools or defensive measures like Snort-wireless.
Ch. 8, "Organizing WarDrives," was my favorite. While the majority of the book offered installation and configuration guides for networking equipment, ch. 8 provided original, helpful advice on conducting formal wardrives. It's one of the better pieces of "hacker history" I've seen in recent years. Ch. 8 alone supports the idea that wardriving is a legitimate activity not solely done by "black hats."
If you want to learn how to wardrive, this book will help you. The book could have been half as long and half as expensive if it had consolidated redundant material and replaced many screenshots with equally relevant text. Moving beyond advice on proper equipment configuration would take this book to the next level. Information on detecting and responding to disassociation attacks or simple unauthorized use of the network would be welcome in a second edition.
8 di 11 persone hanno trovato utile la seguente recensione
4.0 su 5 stelle The perfect book to get you started in wardriving... 28 aprile 2004
Di Thomas Duff - Pubblicato su Amazon.com
Formato: Copertina flessibile
Target Audience
Individuals who are interested in searching out wireless access points and defending their own wireless networks against unauthorized use.
Contents
This book covers the subject of wardriving (searching for wireless networks) and securing your wireless network. The chapters include:
Learning To WarDrive; NetStumbler and MiniStumbler: Overview; Operating NetStumbler and MiniStumbler; Installing Kismet in Slackware Linux 9.1; Installing Kismet in Fedora Core 1; Attacking Wireless Networks; Basic Wireless Network Security; Advanced Wireless Network Security; Index
Review
The hacking concept of exploring technology is something that has always appealed to me. Now, don't get me wrong. I don't spend time cracking networks and breaking into things. It's more of a fascination of "what's out there". And of course, with the advent of wireless networks and the affordability of the hardware, there is a lot more "out there" out there! That's where the concept of wardriving comes in... Surfing the airwaves to see what networks exist. This book will teach you what you need to know to join in this phenomenon.
In many ways, this book is a guide to running some common wardriving software. Once the hardware needs are covered in the opening chapter, the authors start to go into packages such as Kismet, NetStumbler, and MiniStumbler. They do cover software for both Linux and Windows, so you can benefit regardless of what OS you prefer. Interspersed throughout the book is the technical details that will fill in the gaps to the basic "how to" information. Examples of this type of detail are sidebars on active vs. passive WLAN detection, disabling the broadcast beacon, and troubleshooting GPS problems. Once you get the software installed, you'll learn how to map your results for future reference.
The book is also beneficial if you're a network administrator. There is substantial information on how to take steps to make your network less susceptible to discovery and intrusion, as well as what you need to do to improve the encryption capabilities of your network. It is somewhat disturbing to see how many wireless networks are set up with default level access and no encryption. The authors take great pains to distinguish between the discovery of access points and the actual use of them. So while you may think that they are advocating illegal activity, they are actually making sure that you can be a wardriver without breaking any laws.
While generally I like the book, there is something that irritates me about it. They use a lot of screen shots related to the installing and operation of the different software packages. While that might be useful for installing the Linux software if you're not a penguin-head, it borders on overkill for Windows software. I really don't need to see screenshots to know to press Next after the install splash screen and the directory location. Once you're running and configuring the software, that's different. It's a minor point in the overall quality of the book, however.
Conclusion
If the concept of wardriving is something that appeals to you, this is a good one-stop book to get started. Furthermore, if you run or are responsible for maintaining a wireless network, you'll need to know this information in order to secure your network against unauthorized access.
click to open popover