O'Reilly logo

Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition by Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Wireless Technologies, Mobile Security, and Attacks

This chapter covers the following topics:

Image Wireless Technologies: Wireless devices are extremely popular. From wireless LANs to Bluetooth, these technologies must be deployed securely.

Image Mobile Security: Mobile security is an increasingly important part of security. More people bank online on mobile devices than on home computers. Mobile phones are all around us, and so is the potential for attack.

Wireless LANs: This technology is popular at home and at businesses and offers attackers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required