LEADER 03005oam 2200481 450 001 9910583387903321 005 20190911100031.0 035 $a(OCoLC)967226322 035 $a(MiFhGG)GVRL02TV 035 $a(EXLCZ)993710000000971174 100 $a20160716h20172017 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aHacking wireless access points $ecracking, tracking, and signal jacking /$fJennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor 205 $a1st edition 210 1$aCambridge, MA :$cSyngress,$d[2017] 210 4$d?2017 215 $a1 online resource (xv, 155 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aIncludes index. 311 $a0-12-805315-1 311 $a0-12-809225-4 320 $aIncludes bibliographical references and index. 327 $achapter 1. Wireless technology overview -- chapter 2. Wireless adoption -- chapter 3. Blurred edges : fixed and mobile wireless access points -- chapter 4. Hacks against individuals -- chapter 5. WAPs in commercial and industrial contexts -- chapter 6. WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. Noncivilian government context -- chapter 9. Summary and call to action. 330 $aHacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be?and have been?exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology. Explains how the wireless access points in common, everyday devices can expose us to hacks and threats Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data Presents concrete examples and real-world guidance on how to protect against wireless access point attacks 606 $aWireless LANs$xSecurity measures 606 $aHacking 606 $aComputer security 615 0$aWireless LANs$xSecurity measures. 615 0$aHacking. 615 0$aComputer security. 676 $a004.1675068 700 $aKurtz$b Jennifer Ann$0925996 702 $aKaczmarek$b Richard 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910583387903321 996 $aHacking wireless access points$92079019 997 $aUNINA