Posted on March 19, 2013
When someone says the word “wireless”, 99.9% of the audience thinks at the Wireless Networking Technologies (802.11 family). Very few think to the Bluetooth. Even fewer people think to all the other technologies that use wireless technology to work, such as cordless phone, guard radios, headsets, wireless camera etc. This book embrace the last point of view. The first chapter provides basic information and motivation for Wireless Profiling. The chapter 2 provides the reader with all the information she needs to be able to understand the wireless technology and it’s usage.Read More
Posted on March 12, 2013
Metasploit is the most common and complete framework for testing security. Metasploit is an entire suite of tools and methodologies designed for testing the security of computers and networks.
The book is written for both experienced penetration tester and people new to the security field. For the first group, one of the most interesting thing is the explanation of the rules and ideas that formed the Penetration Test Execution Standard, while for users new to the field, is really interesting what can be done and how.Read More