Search Results

1 - 10 of 12 results for "Hurley, Chris"

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

WarDriving: Drive, Detect, Defend

A Guide to Wireless Security


The practice of WarDriving is a unique combination of hobby, sociological research, and security...

How to Cheat at Securing a Wireless Network

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are...

Penetration Tester's Open Source Toolkit

Penetration testing a network requires a delicate balance of art and science. A penetration tester...

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

“InfoSec Career Hacking starts out by describing the many, different InfoSec careers available...

OS X for Hackers at Heart

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system...

WarDriving and Wireless Penetration Testing

Wireless networking has become standard in many business and government networks. This book is the...

IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job

IT Security Interviews Exposed

Secrets to Landing Your Next Information Security Job

Chris Butler, Russ Rogers and 6 more...
Wiley (2007)

Technology professionals seeking higher-paying security jobs need to know security fundamentals to...

Stealing the Network: How to Own an Identity

The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the...

OS X Exploits and Defense: Own it...Just Like Windows or Linux!

OS X Exploits and Defense

Own it...Just Like Windows or Linux!

Paul Baccas, Kevin Finisterre and 5 more...

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues....

Wireless Security: Know It All

The Newnes Know It All Series takes the best of what our authors have written to create hard-working...