March 2026
Intermediate to advanced
400 pages
15h 45m
English
© Tex vector/Shutterstock
THIS CHAPTER CONSIDERS the threats and vulnerabilities that are directly associated with 802.11 wireless networks, their various topologies, and devices. It also looks at wireless local area network (WLAN) vulnerabilities within the context of Internet Protocol (IP) networking and how cyberthieves and hackers leverage WLANs as the “crack in the door” to the corporate networks they attack.
Wireless networks consist of radio cards that work together in a variety of configurations to form peer-to-peer WLAN infrastructures, bridges, backhaul networks, ...
Read now
Unlock full access