Chapter 8. Wireless Technologies, Mobile Security, and Attacks
This chapter covers the following topics:
Wireless Technologies: Wireless devices are extremely popular. From wireless LANs to Bluetooth, these technologies must be deployed securely.
Mobile Security: Mobile security is an increasingly important part of security. More people bank online on mobile devices than on home computers. Mobile phones are all around us, and so is the potential for attack.
Wireless LANs: This technology is popular at home and at businesses and offers attackers ...
Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.