iDefense – Hacking The Invisible Network
Wireless networking technology is becoming increasingly popular but at the same time, had introduced many security issues. A wireless local area network (WLAN) allows workers to access digital resources without being tethered to their desks. Tools to identify WLANs, break WEP keys and capture traffic is discussed in this book.
Download Here
0 comments:
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.