Chapter 8. Wireless Technologies, Mobile Security, and Attacks

This chapter covers the following topics:

Image Wireless Technologies: Wireless devices are extremely popular. From wireless LANs to Bluetooth, these technologies must be deployed securely.

Image Mobile Security: Mobile security is an increasingly important part of security. More people bank online on mobile devices than on home computers. Mobile phones are all around us, and so is the potential for attack.

Wireless LANs: This technology is popular at home and at businesses and offers attackers ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.