Skip to Content
Wireless Security
book

Wireless Security

by Wolfgang Osterhage
December 2011
Intermediate to advanced content levelIntermediate to advanced
230 pages
5h 59m
English
CRC Press
Content preview from Wireless Security
134Wireless Security
In addition to those the following aspects are pertinent:
In the  rst place an attacker has at his disposal a panoply of
technical possibilities to circumvent authentication routines. By
this he not only enters the device itself but he then has all the
options to penetrate internal and external applications. In any case
he has a new launching pad for getting into network applications
belonging to a speci c organization. He has surmounted a  rst
obstacle. Using further technical means he can try to conceal his
illegal access by manipulation in a way that network administrators
or communication o cers will not spot his ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless Communications Security

Wireless Communications Security

Jyrki T. J. Penttinen

Publisher Resources

ISBN: 9781578087686