Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition
- Autorzy:
- Rob Flickenger, Roger Weeks
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 466
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition
The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.
Wireless technology changes not only the way we talk to our devices, but also what we ask them to do. With greater flexibility, broader range, and increased mobility, wireless networks let us live, work, and think differently. Wireless networks also open up a vast range of tasty new hack possibilities, from fine-tuning network frequencies to hot-rodding handhelds.
The second edition of Wireless Hacks, co-authored by Rob Flickenger and Roger Weeks, brings readers more of the practical tips and tricks that made the first edition a runaway hit, selling nearly 30,000 copies. Completely revised and updated, this version includes over 30 brand new hacks, major overhauls of over 30 more, and timely adjustments and touchups to dozens of other hacks introduced in the first edition. From passive network scanning to aligning long-distance antennas, beefing up wireless network security, and beyond, Wireless Hacks answers real-life networking needs with direct solutions.
Flickenger and Weeks both have extensive experience in systems and network administration, and share a passion for making wireless more broadly available. The authors include detailed coverage for important new changes in specifications and in hardware and software, and they delve deep into cellular and Bluetooth technologies.
Whether you need your wireless network to extend to the edge of your desk, fit into your backpack, or cross county lines, the proven techniques in Wireless Hacks will show you how to get the coverage and functionality you're looking for.
Wybrane bestsellery
-
In Linux Unwired, you'll learn the basics of wireless computing, from the reasons why you'd want to go wireless in the first place, to setting up your wireless network or accessing wireless data services on the road. The book provides a complete introduction to all the wireless technologies suppo...
Linux Unwired. A Complete Guide to Wireless Configuration Linux Unwired. A Complete Guide to Wireless Configuration
(80.73 zł najniższa cena z 30 dni)80.73 zł
94.99 zł(-15%) -
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating syste...
Linux Server Hacks. 100 Industrial-Strength Tips and Tools Linux Server Hacks. 100 Industrial-Strength Tips and Tools
(72.24 zł najniższa cena z 30 dni)72.24 zł
84.99 zł(-15%) -
Oto uzupełnione i zaktualizowane wydanie bestsellerowego przewodnika dla inżynierów sieci. Dzięki niemu przejdziesz trudną (ale ekscytującą!) drogę od tradycyjnej platformy do platformy sieciowej opartej na najlepszych praktykach programistycznych. Zaczniesz od zagadnień podstawowych, aby następn...
Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV
(83.85 zł najniższa cena z 30 dni)77.40 zł
129.00 zł(-40%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions. It empowers architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
This book is for software and IT professionals seeking knowledge on Linux systems and DevOps practices. This book will provide you with guidance and tools to learn and gain proficiency in managing Linux-based infrastructures and knowledge of DevOps.
The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow
-
This practical guide helps you explore the pentesting of Microsoft infrastructure in detail, and enhances your offensive skillset by showing you the different ways to perform security assessment. This book will help blue teamers and IT engineers get up to speed with possible security issues they ...
Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
Ebooka "Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5329-6, 9780596553296
- Data wydania ebooka:
- 2005-11-22 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 9.2MB
- Rozmiar pliku Mobi:
- 9.2MB
Spis treści ebooka
- Wireless Hacks, 2nd Edition
- Foreword
- Credits
- About the Authors
- Contributors
- Acknowledgments
- Rob
- Roger
- Preface
- Why Wireless Hacks?
- How to Use This Book
- How This Book Is Organized
- Conventions Used in This Book
- Using Code Examples
- How to Contact Us
- Safari Books Online
- Got a Hack?
- 1. Bluetooth, Mobile Phones, and GPS
- 1.1. Hacks 122: Introduction
- 1. Set Up Bluetooth on Linux
- 2. Set Up Bluetooth on Windows XP
- 1.3.1. Installing Bluetooth
- 1.3.2. Securing Your Bluetooth Connection
- 1.3.3. Networking with Bluetooth
- 1.3.4. See Also
- 3. Connect Mac OS X with a Bluetooth Phone
- 1.4.1. Requirements
- 1.4.2. Adding a Device
- 1.4.3. Connection Setup
- 4. Connect Linux with a Bluetooth Phone
- 1.5.1. Pairing Your Phone
- 1.5.2. Configuring PPP Networking
- 1.5.3. Hacking the Hack
- 5. Connect Windows XP with a Bluetooth Phone
- 6. Use Your Treo as a Modem
- 1.7.1. Treo 650 Bluetooth DUN
- 1.7.2. PdaNet
- 7. Send SMS from a PowerBook
- 8. Remote Control Mac OS X with Bluetooth Phones and PDAs
- 1.9.1. Installing Clicker
- 1.9.2. Connecting to Clicker
- 1.9.3. Hacking the Hack
- 9. Remote Control Linux with a Bluetooth Phone
- 10. Control XMMS with Bluetooth
- 11. Liven Up Parties with a Participatory Slideshow
- 1.12.1. The Slideshow
- 1.12.2. The Code
- 12. Send SMS from Linux
- 13. Remote Control Windows with Bluetooth Phones and PDAs
- 1.14.1. Requirements
- 1.14.2. Installing PuppetMaster
- 1.14.3. Controlling Your PC
- 1.14.4. Hacking the Hack
- 14. Control Your Bluetooth Phone with FMA
- 1.15.1. Requirements
- 1.15.2. Setup
- 1.15.3. FMA
- 15. Control Your Computer from Your Palm
- 1.16.1. Set up VNC on Your Desktop
- 1.16.1.1. Setting up OSXvnc on a Mac.
- 1.16.1.2. Securing the connection.
- 1.16.1.3. Setting up VPN.
- 1.16.1.4. Setting up VPN on Windows XP.
- 1.16.1. Set up VNC on Your Desktop
- 1.16.2. Set up PalmVNC
- 16. Control Your Home Theater from Your Palm
- 1.17.1. Hardware
- 1.17.2. Detailed Instructions
- 1.17.2.1. Using NoviiRemote.
- 1.17.2.2. Using OmniRemote.
- 17. Choose a Cellular Data Plan
- 1.18.1. Flavors of Cellular Data
- 1.18.2. Figure Out What Youll Need
- 1.18.3. Compare the Plans
- 18. Blog from Your Mobile Phone
- 1.19.1. SMS Moblogging
- 1.19.2. Email Moblogging
- 1.19.3. Photo Moblogging to Any Blog Service
- 1.19.3.1. Smart client for Flickr.
- 1.19.4. Hacking the Hack
- 1.19.4.1. Setting up WordPress.
- 1.19.4.2. Email posting with WordPress.
- 1.19.4.3. Setting up email automatic polling.
- 19. Get Google Maps on Your Mobile Phone
- 20. Share Your GPS
- 1.21.1. Connecting the GPS
- 1.21.2. See Also
- 21. Broadcast Your GPS Position
- 1.22.1. See Also
- 22. Map Wi-Fi Networks with Kismet and GPSd
- 1.23.1. See Also
- 2. Network Discovery and Monitoring
- 2.1. Hacks 2339: Introduction
- 23. Find All Available Wireless Networks
- 2.2.1. Windows XP
- 2.2.2. Mac OS X
- 2.2.3. Linux
- 24. Discover Networks with NetStumbler
- 2.3.1. Options
- 2.3.2. Network Discovery
- 2.3.3. Caveats
- 25. Detect Networks with Handheld PCs
- 2.4.1. MiniStumbler
- 2.4.2. WiFiFoFum
- 2.4.3. Other Handhelds
- 26. Find and Join Wireless Networks with AP Radar
- 2.5.1. Prerequisites
- 2.5.2. Building and Using AP Radar
- 2.5.3. Final Thoughts
- 27. Detect Networks on Mac OS X
- 2.6.1. MacStumbler
- 2.6.2. iStumbler
- 2.6.3. Final Thoughts
- 28. Scan Passively with KisMAC
- 29. Detect Networks with Kismet
- 2.8.1. Installation
- 2.8.2. Running Kismet
- 2.8.3. Cleaning Up
- 2.8.4. See Also
- 30. Monitor Wireless Links in Linux with Wavemon
- 31. Analyze Traffic with Ethereal
- 32. Track 802.11 Frames in Ethereal
- 33. Watch Network Traffic
- 34. grep Your Network
- 2.13.1. The Code
- 2.13.2. Running the Hack
- 35. Check Wi-Fi Network Performance with Qcheck
- 36. Estimate Network Performance
- 37. Get Real-Time Network Stats
- 38. Graph Your Wireless Performance
- 39. Find Radio Manufacturers by MAC
- 2.18.1. The Code
- 2.18.2. Running the Hack
- 3. Wireless Security
- 3.1. Hacks 4051: Introduction
- 40. Stop Moochers from Stealing Your Wi-Fi Bandwidth
- 3.2.1. Hacking the Hack
- 41. Visualize a Network
- 3.3.1. EtherPEG
- 3.3.2. DriftNet
- 42. Secure Your Linux Network with WPA
- 3.4.1. Requirements
- 3.4.1.1. Drivers.
- 3.4.1.2. WPA types.
- 3.4.1. Requirements
- 3.4.2. Installing wpa_supplicant
- 3.4.2.1. Ubuntu package.
- 3.4.2.2. Fedora Core 3 compile.
- 3.4.3. Configuration
- 3.4.4. Testing and Usage
- 3.4.5. Running wpa_cli
- 43. Control Wireless Access by MAC
- 3.5.1. FreeRADIUS Configuration
- 3.5.2. Access Point Configuration
- 44. Authenticate Wireless Users
- 3.6.1. FreeRADIUS Configuration
- 3.6.2. Access Point Configuration
- 45. Forward Ports over SSH
- 3.7.1. See Also
- 46. Proxy Web Traffic over SSH
- 47. Securely Connect Two Networks
- 3.9.1. vtun Setup
- 3.9.2. vtun with SSH
- 3.9.3. Tips and Tricks
- 48. Generate a Tunnel Configuration Automatically
- 3.10.1. The Code
- 49. Poll Wireless Clients
- 50. Interrogate the Network
- 51. Track Wireless Users
- 4. Hardware Hacks
- 4.1. Hacks 5262: Introduction
- 52. Add an External Antenna
- 4.2.1. Patch Antennas
- 4.2.2. Popsicle Omni Antennas
- 4.2.3. Rubber Ducky Antennas
- 53. Do-It-Yourself Access Point Hardware
- 54. Boot from a Compact Flash Hard Drive
- 55. Increase the Range of a PowerBook
- 56. Send Power over Your Ethernet
- 4.6.1. Step by Step
- 4.6.2. Resistance Is Futile
- 57. The NoCat Night Light
- 58. Upgrade the Linksys WET11
- 4.8.1. Add an Antenna
- 4.8.2. Upgrade the Radio
- 4.8.3. Use a Battery Pack
- 59. Scan for Wireless Networks Automatically
- 4.9.1. Requirements
- 4.9.2. Construction
- 4.9.3. Software
- 4.9.4. Hacking the Hack
- 60. Backlight Your Zipit
- 4.10.1. Getting It Open
- 4.10.2. Removing the Mainboard
- 4.10.3. Opening the LCD
- 4.10.4. Removing the LCD Reflector
- 4.10.5. Preparing and Installing the EL Panel
- 4.10.6. Wiring
- 4.10.7. The Driver Board
- 4.10.8. Hacking the Hack
- 61. Unwire Your Pistol Mouse
- 4.11.1. Requirements
- 4.11.2. Disassembly
- 4.11.3. Wiring
- 4.11.4. Testing and Debugging
- 4.11.5. Cutting
- 4.11.6. Reassembly
- 4.11.7. Use
- 62. Mobilize Your WRT54G with the WiFiCar
- 4.12.1. The Software
- 4.12.2. The Hardware
- 5. Software Hacks
- 5.1. Hacks 6382: Introduction
- 63. Build Your Own Access Point with Linux
- 5.2.1. Hardware Choices
- 5.2.2. Radio Cards and Antennas
- 5.2.3. Software Requirements
- 5.2.4. HostAP
- 5.2.4.1. Ubuntu package install.
- 5.2.4.2. Compiling from source.
- 5.2.5. Madwifi
- 5.2.5.1. Ubuntu package install.
- 5.2.5.2. Compiling from source.
- 5.2.6. Configuring Your AP
- 5.2.7. Hacking the Hack
- 64. Bridge Your Linux AP
- 5.3.1. Bridge Setup
- 5.3.2. Caveats
- 5.3.3. See Also
- 65. Protect Your Bridge with a Firewall
- 66. Filter MAC with HostAP and Madwifi
- 67. Upgrade Your Wireless Router
- 5.6.1. Sveasoft Firmware
- 5.6.2. OpenWRT
- 5.6.3. Hacking the Hack
- 68. Set Up an OLSR Mesh Network
- 5.7.1. Getting the Firmware
- 5.7.2. Uploading the Firmware
- 5.7.3. Getting Meshed Up
- 5.7.4. Rinse and Repeat
- 5.7.5. Meshing Made Easy
- 5.7.6. Troubleshooting the Firmware Upload
- 5.7.7. See Also
- 69. Extend Your Wireless Network with WDS
- 5.8.1. WDS Requirements
- 5.8.2. Linksys Alchemy Setup
- 5.8.3. HostAP Setup
- 5.8.4. Hacking the Hack
- 70. Pebble
- 71. Wall Off Your Wireless
- 5.10.1. Installation
- 5.10.2. Configuration
- 5.10.3. Using m0n0wall
- 72. Run Your Mac as an Access Point
- 73. Run Linux on the Zipit Wireless Messenger
- 5.12.1. Flashing the Zipit
- 5.12.1.1. Becoming the man in the middle.
- 5.12.1.2. Setting up the DNS.
- 5.12.1.3. Setting up the web server.
- 5.12.1. Flashing the Zipit
- 5.12.2. zflash OpenZipit over NFS
- 5.12.2.1. NFS setup.
- 5.12.2.2. zflash.
- 5.12.3. Customizing Your Image
- 5.12.3.1. Modify the default settings.
- 5.12.3.2. Add useful scripts.
- 5.12.3.3. Get some tunes going.
- 5.12.4. Hacking the Hack
- 5.12.5. See Also
- 74. Capture Wireless Users with NoCatAuth
- 75. Capture Wireless Users on a Small Scale
- 76. Build an Online Community in Your Offline Neighborhood
- 5.15.1. PlaceSite
- 5.15.2. The Core Components.
- 5.15.2.1. The server.
- 5.15.2.2. The node.
- 5.15.3. PlaceSite in Action
- 5.15.4. Setting Up Your Own PlaceSite
- 5.15.5. Running the Hack
- 5.15.6. Troubleshooting the Hack
- 5.15.7. Hacking the Hack
- 77. Manage Multiple AirPort Base Stations
- 5.16.1. A Power Tool for Configuration Management
- 5.16.2. Tweaking Placement of Base Stations
- 78. Advertise Bonjour Services in Linux
- 5.17.1. Background
- 5.17.2. Using Howl
- 79. Advertise Any Service with Bonjour in Mac OS X
- 5.18.1. Network Beacon
- 5.18.2. mod_bonjour
- 80. Redirect Brought to you by Bonjour Ads
- 81. Use a Windows-Only Wireless Card in Linux
- 5.20.1. WLAN DriverLoader
- 5.20.2. NdisWrapper
- 5.20.3. Final Thoughts
- 82. Use Your Orinoco Card with Hermes AP
- 6. Do-It-Yourself Antennas
- 6.1. Hacks 8393: Introduction
- 83. Make a Deep Dish Cylindrical Parabolic Reflector
- 84. Spider Omni Antenna
- 85. Pringles Can Waveguide
- 6.4.1. Front Collector Construction
- 6.4.2. Preparing the Can
- 6.4.3. Element Construction
- 86. Pirouette Can Waveguide
- 6.5.1. See Also
- 87. Primestar Dish with Waveguide Feed
- 6.6.1. Construction
- 6.6.2. Other Considerations
- 6.6.3. Hacking in 802.11a
- 88. Primestar Dish with Biquad Feed
- 6.7.1. Construction of the Biquad
- 6.7.2. Biquad Antenna for PCS Cellular Radio
- 89. Cut a Cable Omni Antenna
- 6.8.1. Cutting the Pieces
- 6.8.2. Building a Jig
- 90. Build a Slotted Waveguide Antenna
- 6.9.1. How a Waveguide Antenna Works
- 6.9.2. Unidirectional Waveguide Antennas
- 6.9.3. Omnidirectional Slotted Waveguide Antennas
- 6.9.4. Highly Directional Slotted Waveguide Antennas
- 6.9.5. Construction Details for the 8-Slot Unidirectional Antenna
- 6.9.6. Coupling the Signal into the Waveguide
- 6.9.7. 8+8 Slot Omnidirectional Antenna
- 6.9.8. 8-Slot Unidirectional Antenna
- 6.9.9. Construction Details for 16- and 16+16-Slot Design
- 91. The Passive Repeater
- 6.10.1. Why a Passive Repeater Wont Work
- 6.10.2. An Example that Almost Works
- 6.10.3. A Working Example
- 92. Determine Your Antenna Gain
- 93. Build Cheap, Effective Roof Mounts
- 7. Wireless Network Design
- 7.1. Hacks 94100: Introduction
- 94. Analyze Elevation Profiles for Better Long-Range Wireless Networking
- 7.2.1. NoCat Maps
- 7.2.2. Installing Your Own Profile Analyzer
- 7.2.3. Getting the Elevation Data
- 7.2.4. Setting Up the Application
- 7.2.5. Starting Your Elevation Profiler for the First Time
- 7.2.6. The Caveats
- 95. Build a Wireless Network for the Large House
- 7.3.1. Two Antennas Are Better Than One
- 7.3.2. Plugging Into Wireless
- 7.3.3. Hacking the Hack
- 96. Establish Line of Sight
- 7.4.1. Using a GPS to Log Prospective LAT/LONG/ALT
- 7.4.2. Plotting the Points on a 3D Map
- 97. Calculate the Link Budget
- 98. Align Antennas at Long Distances
- 99. Slow Down to Speed Up
- 100. Take Advantage of Antenna Polarization
- A. Wireless Standards
- A.1. 802.11: The Mother of All IEEE Wireless Ethernet
- A.1.1. Pros
- A.1.2. Cons
- A.1.3. Recommendation
- A.1. 802.11: The Mother of All IEEE Wireless Ethernet
- A.2. 802.11a: The Betamax of the 802.11 Family
- A.2.1. Pros
- A.2.2. Cons
- A.2.3. Recommendation
- A.3. 802.11b: The De Facto Standard
- A.3.1. Pros
- A.3.2. Cons
- A.3.3. Recommendation
- A.4. 802.11g: Like 802.11b, only Faster
- A.4.1. Pros
- A.4.2. Cons
- A.4.3. Recommendation
- A.5. 802.16: WiMAX Long Distance Wireless Infrastructure
- A.5.1. Pros
- A.5.2. Cons
- A.5.3. Recommendation
- A.6. Bluetooth: Cable Replacement for Devices
- A.6.1. Pros
- A.6.2. Cons
- A.6.3. Recommendation
- A.7. 900 MHz: Low Speed, Better Coverage
- A.7.1. Pros
- A.7.2. Cons
- A.7.3. Recommendation
- A.8. CDPD, 1xRTT, and GPRS: Cellular Data Networks
- A.8.1. CDPD on TDMA
- A.8.2. 1xRTT on CDMA
- A.8.3. GPRS on GSM
- A.9. FRS and GMRS: Super Walkie-Talkies
- A.9.1. FRS
- A.9.2. GMRS
- A.9.3. Extending Range
- A.10. 802.1x: Port Security for Network Communications
- A.11. WPA & 802.11i
- A.11.1. Pros
- A.11.2. Cons
- A.11.3. Recommendation
- A.12. BSS Versus IBSS
- B. Wireless Hardware Guide
- B.1. Microwave Cabling
- B.2. Microwave Connector Reference
- B.3. Antenna Guide
- B.3.1. Omni
- B.3.2. Sector (or Sectoral)
- B.3.3. Yagi
- B.3.4. Waveguides and Cantennas
- B.3.5. Parabolic Dishes
- B.3.6. Putting It All Together
- B.4. Pigtails
- B.5. 802.11 Hardware Suppliers
- Index
- About the Authors
- Colophon
- Copyright
O'Reilly Media - inne książki
-
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(194.65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves ...(203.15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs a...
Becoming SRE. First Steps Toward Reliability for You and Your Organization Becoming SRE. First Steps Toward Reliability for You and Your Organization
(135.15 zł najniższa cena z 30 dni)143.65 zł
169.00 zł(-15%) -
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern data warehouse. These new architectures have solid benefits, but they're also surrounded by a lot of hyperbole and confusion. This practical book provides a guided tour of these architectures to...(237.15 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
As an engineering manager, you almost always have someone in your company to turn to for advice: a peer on another team, your manager, or even the head of engineering. But who do you turn to if you're the head of engineering? Engineering executives have a challenging learning curve, and many folk...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software...(169.14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Entity resolution is a key analytic technique that enables you to identify multiple data records that refer to the same real-world entity. With this hands-on guide, product managers, data analysts, and data scientists will learn how to add value to data by cleansing, analyzing, and resolving data...(203.15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Wireless Hacks. Tips & Tools for Building, Extending, and Securing Your Network. 2nd Edition Rob Flickenger, Roger Weeks (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.