"synopsis" may belong to another edition of this title.
In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."
"About this title" may belong to another edition of this title.
Shipping:
US$ 4.00
Within U.S.A.
Book Description Paperback. Condition: new. New. Fast Shipping and good customer service. Seller Inventory # Holz_New_159749111X
Book Description Paperback. Condition: new. New Copy. Customer Service Guaranteed. Seller Inventory # think159749111X
Book Description Paperback. Condition: new. Brand New Copy. Seller Inventory # BBB_new159749111X
Book Description Condition: New. New! This book is in the same immaculate condition as when it was published 1.92. Seller Inventory # 353-159749111X-new
Book Description Condition: New. Seller Inventory # ABLIING23Mar2811580097192
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9781597491112_lsuk
Book Description PF. Condition: New. Seller Inventory # 6666-IUK-9781597491112
Book Description Paperback. Condition: New. Seller Inventory # XH-020
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9781597491112
Book Description Taschenbuch. Condition: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester's Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks. Seller Inventory # 9781597491112