Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition

Peer-to-Peer Hacking over Ad Hoc Networks

Wireless networks configured using the 802.11 standard take two forms:

  • Infrastructure networks—These require a central access point to serve as the hub of all access and communications. Client stations must communicate with each other via the access point. The same is true for communication beyond the access point via the distribution medium.
  • Ad hoc networks—With ad hoc networking, peer-to-peer relationships are formed directly between client stations to form informal networks.

Ad hoc networks are typically used to connect peripherals to devices—for example, a printer to a laptop. However, they can also be used to temporarily connect laptops to create an impromptu network—for example, during a presentation ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733