
Today wireless networks are everywhere. In this book
- Perform ethical hacks without compromising a system
- Combat denial of service and WEP attacks
- Understand how invaders think
- Recognize the effects of different hacks
- Protect against war drivers and rogue devices
No comments:
Post a Comment