O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

When working with any type of network or information one of the fundamental components that needs to be addressed is that of integrity. The integrity of data is essential as the receiver of a piece of information needs to have confidence that what they are receiving and relying on is faithful to the intent of the creator and sender of that data. If the integrity, and therefore confidence, in data is lost then data becomes essentially worthless.

If you have been in security long enough you have undoubtedly run into the well-known CIA triad, which is shorthand for Confidentiality, Integrity, and Availability. Simply put, the confidentiality refers to keeping information safe from unauthorized access or disclosure. Availability ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required