Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication About the Author Preface Acknowledgments Chapter 1. Wireless Technology Overview
Abstract The Wonder of Wandering Signals Wireless Devices, Simplified The Telecommunications Standards Landscape Telecommunications Rules of Engagement Wireless Communications Rules of Engagement IEEE 802 Categories for Networking Standards Wireless LAN or Wi-Fi (802.11x) Wireless MAN or WiMAX (802.16) Wireless PAN (802.15) Radio Frequency Identification (RFID) Supervisory Control and Data Acquisition Where Do We Go From Here? Endnotes
Chapter 2. Wireless Adoption
Abstract Wireless Innovation and Adoption: Early Market Penetration Wireless Market Penetration: US Context Wireless Penetration Rates: Global Context Wireless Penetration Rates: Security Risk Context Hacking Goals: Strategies and Steps Endnotes
Chapter 3. Blurred Edges: Fixed and Mobile Wireless Access Points
Abstract The Hacking End Game Differentiation Between Fixed and Mobile WAPs Hacking Opportunities in Hybrid Networks and Communications Channels Challenges for Securing Hybrid Networks and Communications Channels Implications for Connections With Wired (Legacy) Networks and Systems Recommendations for Wireless/Hybrid Systems Importance of Context (Use Case Scenarios) Endnotes
Chapter 4. Hacks Against Individuals
Abstract Account Credentials Chain Attack Public Wi-Fi Hotspot Attack The Gullibles Travel Attack The Internet of Hacked Things Attack Endnotes
Chapter 5. WAPs in Commercial and Industrial Contexts
Abstract Overview Opportunities Commercial Space Taxonomy Endnotes
Chapter 6. WAPs in Medical Environments
Abstract Medical EHRs EHRs and Medical Devices Takeaways EHRs, Medical Devices, and ICS Takeaways Conclusion Endnotes
Chapter 7. Hacking Wireless Access Points: Governmental Context
Abstract Attack Chronology Takeaways Summary Endnotes
Chapter 8. Noncivilian Government Context
Abstract National Security Public Safety and Emergency Management Interoperability Challenges: People, Process, and Technology Representative Challenges: Policy and Procedure (AKA Process Engineering) Representative Challenges: Personnel (AKA Human Engineering) Representative Challenges: Technology (AKA Network and Design Engineering) The National Public Safety Broadband Network (AKA FirstNet) National Security: Real-World Attack Scenarios Takeaways Endnotes
Chapter 9. Summary and Call to Action
Abstract Thinking Like a Hacker: Aligning With Attack Methodologies Call to Action for Organizations Call to Action for Individuals Call to Action for Automated Systems The Importance of Thinking Earnestly Conclusion Endnotes
Appendix Glossary Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion