CDN$ 18.00
  • List Price: CDN$ 35.99
  • You Save: CDN$ 17.99 (50%)
FREE Shipping on orders over CDN$ 25.
Usually ships within 1 to 2 months.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Quantity:1
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking Wireless Networks For Dummies Paperback – Sep 13 2005


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
CDN$ 18.00
CDN$ 17.99 CDN$ 27.81

Best Books of 2014
Unruly Places, Alastair Bonnett’s tour of the world’s most unlikely micro-nations, moving villages, secret cities, and no man’s lands, is our #1 pick for 2014. See all

Special Offers and Product Promotions

  • Join Amazon Student in Canada


Frequently Bought Together

Hacking Wireless Networks For Dummies + Hacking For Dummies
Price For Both: CDN$ 36.00

One of these items ships sooner than the other.


Customers Who Viewed This Item Also Viewed



Product Details


Product Description

From the Back Cover

Become a cyber-hero — know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
—Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient — not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices

About the Author

Kevin Beaver, CISSP, is a 16-year specialist in security assessments and incident response.

Peter T. Davis, CISSP, has worked with information systems audits and security for 24 years.


Inside This Book (Learn More)
First Sentence
Wireless local-area networks - often referred to as WLANs or Wi-Fi networks - are all the rage these days. Read the first page
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 10 reviews
22 of 25 people found the following review helpful
A must-read for security professionals with wireless networks... Sept. 25 2005
By Thomas Duff - Published on Amazon.com
Format: Paperback
Think your wireless network is secure from unauthorized use or attack? It's probably not. I just finished reading Hacking Wireless Network For Dummies by Kevin Beaver and Peter T. Davis, and this is one of the most practical books I've ever read for testing a network against attack.

Contents:

Part 1 - Building the Foundation for Testing Wireless Networks: Introduction to Wireless Hacking; The Wireless Hacking Process; Implementing a Testing Methodology; Amassing Your War Chest

Part 2 - Getting Rolling with Common Wi-Fi Hacks: Human (in)Security; Containing the Airwaves; Hacking Wireless Clients; Discovering Default Settings; Wardriving

Part 3 - Advanced Wi-Fi Hacks: Still at War; Unauthorized Wireless Devices; Network Attacks; Denial-of-Service Attacks; Cracking Encryption; Authenticating Users

Part 4 - The Part of Tens: Ten Essential Tools for Hacking Wireless Networks; Ten Wireless Security-Testing Mistakes; Ten Tips for Following Up after Your Testing

Part 5 - Appendixes: Wireless Hacking Resources; Glossary of Acronyms

Index

The target of this book is the security professional involved in testing networks to make them more secure. There's a heavy emphasis on "ethical hacking", or learning how to test a network's security without doing harm or using the information in a destructive fashion. A security consultant using this book would learn how to pre-plan a test, work with the company to make sure they were properly authorized, and then write up the results in a professional manner. That aspect of the book is impressive, and it helps to frame the information in the right light (not as a textbook on how to break into networks).

From a practical standpoint, this book excels. Each of the chapters covers the theory behind how or why a certain aspect of a wireless network would be vulnerable to an attack or exploit. Then the authors cover a number of open source and commercial software packages that are available to focus on that area. For instance, chapter 14 goes into why WEP encryption is flawed and how it can be broken with relatively little effort. It's followed by an explanation on how WPA addresses some of those issues. Finally you get coverage on available tools that are used to crack WEP and how you can use them to test your own network.

Highly practical and heavy on application... If you're a security professional with responsibility for your organization's wireless network, you need to read this book. And if you're a techno-geek with your own wireless network, you'll want to get this book to play around. I know I will be doing a little hacking at Chez Duffbert...
36 of 46 people found the following review helpful
Writing useless books for dummies Feb. 5 2008
By Riccardo Audano - Published on Amazon.com
Format: Paperback Verified Purchase
This is the real specialty the authors of this book have mastered...
I am astonished at how many positive reviews this horrible, stinky title has received ... how many friends do this guys have? In fact this has got to be one of the worst tech book I have ever read, a total waste of money and paper.
My advice is , avoid this book, and any other book form the same authors, like plague! You will learn NOTHING from them.
The authors go on and on babbling about how unsecure wireless networks are, and are nonetheless unable to clearly indicate you any technique to take advantage or to protect form this weakness. All you get (apart from the boring and repetitive author's ruminations) are a few screenshots of NetStumbler (hey man, I can see by myself what it looks like, teach me how to use it instead ..), one screenshot of Kismet running on a linux xterm and a list of some of its command options (come on do you think that a beginner would ever be able to figure out how to use a open source tool like Kismet all by himself?)
Ah we also get a little advertisement for a couple of non-free tools like AiroPeek ... like a beginner should spend money on that? And , wait, there is no tutorial or intro on those tools as well. Just the usual couple of screenshots to make the book look good if you flip through it at the bookstore.
Seriously, I know this is hard to believe, but this pathetic excuse for a book is just a series of boring trivialities
For example ... did you ever think about the fact that installing a non-authorized, non-encrypted access point in your office network might actually be a security risk? I am sure you didn't, but thanks to this beautiful book you know, as the author spends pages and pages rambling and babbling about this absurd topic!
Years ago the "For Dummies" series used to be the right choice if you needed a humorous, tutorial-like but solid intro to a 'foreign' technology, but now the title is not a joke anymore.
"Hacking Wireless Networks for Dummies".. true to its title!
5 of 6 people found the following review helpful
Worth reading but don't expect to be an expert July 2 2009
By William Scarbrough - Published on Amazon.com
Format: Paperback
Most of the Dummies series books are appetite wetters at best and that's where they end.

They touch on the advanced things but don't explain enough for you to really fully realize the potential of anything. It's sort of like going into a suntan studio with a 3/4 raincoat on. You might get something out of being there but not enough for it to really be useful.

This book is no exception.

While it does touch on things such as ARP poisoning and Net Stumbler as well as some other useful starting points, it leaves a lot to be desired when it comes to expanding enough to make things worthwhile. It's a good introduction book but if you're planning on doing some real penetrations or penetration testing there are better books suited for this.

I would call this one a pre-reference reference book. At best.
11 of 16 people found the following review helpful
If you've already been hit, or you're waiting for it to happen. Nov. 7 2005
By John Matlock - Published on Amazon.com
Format: Paperback
There are two or three reasons you would want to read this book. If you're responsible for the security of a wireless network, there are two possibilities:

1. someone has broken into your network, gotten sensitive information or used your system to send out 500,000 SPAM e-mails, or

2. they haven't broken in yet, and you're being pro-active (good for you). The third possibility is that you're looking for or even thinking about going to work as a wireless security expert.

In all three of these cases, this is a good place to start. The book starts with a description of how to go attack your own system from the outside and thereby learning what an outside hacker could get by doing the same thing. Then when you find a hole in the security, it tells you how to secure it.

One nice thing about this book, like all 'For Dummies' books is the writing style. It tells you what you want to know without being either too simple or so overloaded with jargon that you can't make sense out of it. Another nice thing is that this book tells you specifically what software/hardware devices you need to get to accomplish the tasks, and it does so without concentrating on multi thousand dollar expenses.
Fantastic primer May 13 2014
By Thomas B - Published on Amazon.com
Format: Paperback Verified Purchase
I needed to round out my security knowledge with some basic understanding of how wifi networks are exploited and this is a fantastic book for just that. I don't believe there is such a thing as a safe wifi network anymore. With enough time, just about any encryption key can be reverse engineered. It drastically changed my own home security profile, and taught me more than I needed to know about wifi security.


Feedback