Chapter 16. Investigating Wireless Attacks
Introduction
In many corporate networks across the country, wireless devices are extending the network perimeter beyond the confines of the office walls and into neighboring buildings and public streets. No longer does an attacker need to gain network access by breaking into an office or attempting to bypass strict firewall policies. Now they can take advantage of an unsuspecting company who doesn’t realize ...
Get The Best Damn Cybercrime and Digital Forensics Book Period now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.