000 02188nkm a2200433Ia 4500
001 on1013545173
003 OCoLC
005 20180530132845.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 171130s2017 xx 081 o vleng d
035 _a(OCoLC)1013545173
037 _aCL0500000916
_bSafari Books Online
040 _aDLC
_beng
_cDLC
_dSafari Books Online, LLC
_dAU
049 _aAlfaisal Main Library
050 4 _aQA76.9.A25
100 1 _aRussell, Chad,
_eon-screen presenter.
245 1 0 _aWireless hacking for cyber professionals /
_cChad Russell.
246 1 _iTitle on title screen:
_aAdvanced wireless security
264 1 _a[Place of publication not identified] :
_bStone River eLearning,
_c2017.
300 _a1 online resource (1 streaming video file (1 hr., 20 min., 2 sec.)) :
_bdigital, sound, color
336 _atwo-dimensional moving image
_btdi
_2rdacontent
337 _acomputer
_bc
_2rdamedia
337 _avideo
_bv
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
511 0 _aPresenter, Chad Russell.
500 _aTitle from resource description page (Safari, viewed November 29, 2017).
520 _a"This course covers tools and techniques related to hacking, auditing and pen testing wireless network protocols. You will learn wireless hacking terminology and how to use these skills to become a paid security professional. The demand for Certified Ethical Hackers, Cyber Security Engineers, Administrators, Consultants, Architects, Business Analysts, Project Managers, etc. is immense. The Certified Ethical Hacker certification is an attainable path to helping business protect their digital assets in the cloud and on-premise. You can do it! "--Resource description page.
650 0 _aComputer security.
650 0 _aHacking.
650 0 _aWireless communication systems
_xSecurity measures.
650 0 _aComputer networks
_xSecurity measures.
655 7 _aElectronic books.
_2local
710 2 _aSafari eBooks.
856 4 0 _uhttp://ezproxy.alfaisal.edu/login?url=http://academic.safaribooksonline.com/?uiCode=sdl&xmlId=100000006A0727
942 _2lcc
_cEBOOKS
994 _aC0
_bUMI
260 _c2017.
999 _c549966
_d549966