Chapter 9. Wireless Technologies, Mobile Security, and Attacks

This chapter covers the following topics:

Image Wireless Technologies: Wireless devices are extremely popular. From wireless LANs, to Bluetooth, to mobile phones, these devices are all around us, and so is the potential for attack.

Image Wireless LANs: This technology is popular at home and at businesses and offers attackers an easy way to target a network. Securing these technologies is of critical importance.

This chapter introduces you to the world of wireless communication. Wireless communication ...

Get Certified Ethical Hacker (CEH) Cert Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.