Chapter 15Wireless Networking

  1. image III. Security
    • P. Vulnerabilities
  2. image IV. Tools/Systems/Programs
    • O. Operating environments (e.g., Linux, Windows, Mac)
    • S. Exploitation tools

Wireless networks have been popular for over a decade now and have quickly replaced or enhanced wired networks. The ability to become more mobile due to the lack of wires has been a big motivator in the adoption of the technology by businesses as well as end users. Additionally the technology has made it possible to push networks ...

Get CEH: Certified Ethical Hacker Version 8 Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.