Wireless penetration testing : (Record no. 64663)

MARC details
000 -LEADER
fixed length control field 03253nmm a22003257a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240822144121.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 240822b |||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9789355512758 (e-book)
040 ## - CATALOGING SOURCE
Transcribing agency Cavite State University - Main Campus Library
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9
Item number El1 2023
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name El Fiky, Ahmed Hashem
9 (RLIN) 48583
Relator term author
245 ## - TITLE STATEMENT
Title Wireless penetration testing :
Remainder of title up and running /
Statement of responsibility, etc. by Ahmed Hashem El Fiky
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. London :
Name of publisher, distributor, etc. BPB Publications,
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (303, pages) :
Other physical details color illustrations.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
500 ## - GENERAL NOTE
General note https://portal.igpublish.com/iglibrary/ is required to read this e-book.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Wireless penetration testing lab setup -- 2. Wireless attacking techniques and methods -- 3. Wireless information gathering and foot printing -- 4. Wireless vulnerability research -- 5. Gain access to wireless network -- 6. Wireless vulnerability assessment -- 7. Client-side attacks -- 8. Advanced wireless attacks -- 9. Wireless post-exploitation -- 10. Android penetration testing -- 11. iOS penetration testing -- 12. Reporting
520 ## - SUMMARY, ETC.
Summary, etc. This book satisfies any IT professional's desire to become a successful ethical hacker who is willing to be employed in identifying and exploiting flaws in the organization's network environment. This book explains in detail how to conduct wireless penetration tests using a wide variety of tools to simulate cyber attacks on both Android and iOS mobile devices and wireless networks.<br/><br/>This book walks you through the steps of wireless penetration testing from start to finish. Once Kali Linux has been installed on your laptop, as demonstrated, you will check the system requirements and install the wireless adapter. The book then explores the wireless LAN reconnaissance phase, which outlines the WEP and WPA/WPA2 security protocols and shows real-world attacks against them using Kali Linux tools like Aircrack-ng. Then, the book discusses the most recent and sophisticated cyberattacks that target access points and wireless devices and how to prepare a compelling and professionally presented report.<br/><br/>As a bonus, it removes myths, addresses misconceptions, and corrects common misunderstandings that can be detrimental to one's professional credentials. Tips and advice that are easy to implement and can increase their marketability as a pentester are also provided, allowing them to quickly advance toward a satisfying career in the field.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Source of acquisition Fund 164
Vendor CE-Logic
Method of acquisition Purchased
Date of acquisition February 19, 2024
Accession number OEBP000498
Owner P. Roderno
Purchase price PHP 1,938.00 <br/>
PO No. 2024-02-0124
Sales Invoice No. 2024-1-113
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Instruments and machines
9 (RLIN) 48124
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Calculating machines
9 (RLIN) 48125
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Electronic computers
9 (RLIN) 48126
856 ## - ELECTRONIC LOCATION AND ACCESS
Electronic File <a href="https://portal.igpublish.com/iglibrary/obj/BPB0000381?searchid=1721007517810zXKlg2XvS3hT85yGnlnpS">https://portal.igpublish.com/iglibrary/obj/BPB0000381?searchid=1721007517810zXKlg2XvS3hT85yGnlnpS</a>
Link text Click here to read Full-Text E-Book
856 ## - ELECTRONIC LOCATION AND ACCESS
Electronic File <a href="https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform">https://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform</a>
Link text Log-in to the website is required to read this e-book. Click here to request access.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Online E-Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Source of acquisition Coded location qualifier Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Library of Congress Classification     Non-fiction Ladislao N. Diwa Memorial Library Ladislao N. Diwa Memorial Library Multimedia Section 02/19/2024 164 OEBP   OEBP QA76.9 El1 2023 OEBP000498 08/22/2024 08/22/2024 Online E-Books PAV
    Library of Congress Classification   Room use only Non-fiction Ladislao N. Diwa Memorial Library Ladislao N. Diwa Memorial Library Multimedia Section 02/19/2024 164 EB   EB QA76.9 El1 2023 CD0001427 08/22/2024 08/22/2024 Compact Discs PAV
Copyright © 2024. Cavite State University | Koha 23.05