About: The Penetration Testing Of Wifi Networks     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • The wireless networks play the important role in the modern world. The Wi-Fi networks expand to many parts of common life. If you try scanning for the wireless network, you might always detect a huge of signals everywhere. The wireless is modern. But the range of these networks is wider than many owners think. The wide range of these networks will be dangerous, because the owner occasionally does not reduce the power of the net. The unregulated network will be detected and accessible outside the owner place. And everybody can use it. The paper describes commonly using methods for security testing of Wi-Fi networks. The best solution for testing the network security is the penetration test of designed network. The penetration test is commonly named as the “Pentest”. The pentest is similar than regular hack attack aimed to the destination network. The pentester use the same techniques than real hacker. If the pentest is successful, the network owner must apply the better methods for the securing of the network.
  • The wireless networks play the important role in the modern world. The Wi-Fi networks expand to many parts of common life. If you try scanning for the wireless network, you might always detect a huge of signals everywhere. The wireless is modern. But the range of these networks is wider than many owners think. The wide range of these networks will be dangerous, because the owner occasionally does not reduce the power of the net. The unregulated network will be detected and accessible outside the owner place. And everybody can use it. The paper describes commonly using methods for security testing of Wi-Fi networks. The best solution for testing the network security is the penetration test of designed network. The penetration test is commonly named as the “Pentest”. The pentest is similar than regular hack attack aimed to the destination network. The pentester use the same techniques than real hacker. If the pentest is successful, the network owner must apply the better methods for the securing of the network. (en)
Title
  • The Penetration Testing Of Wifi Networks
  • The Penetration Testing Of Wifi Networks (en)
skos:prefLabel
  • The Penetration Testing Of Wifi Networks
  • The Penetration Testing Of Wifi Networks (en)
skos:notation
  • RIV/70883521:28140/11:43865806!RIV12-MSM-28140___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • P(ED2.1.00/03.0089), S
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 219855
http://linked.open...ai/riv/idVysledku
  • RIV/70883521:28140/11:43865806
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • pentesting, penetration test, wi-fi, security (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [D48F5CF30A0E]
http://linked.open...v/mistoKonaniAkce
  • Zlín
http://linked.open...i/riv/mistoVydani
  • Zlín
http://linked.open...i/riv/nazevZdroje
  • Conference Proceedings Internet, Competitiveness and Organizational Security
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...cetTvurcuVysledku
http://linked.open...vavai/riv/projekt
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Malaník, David
http://linked.open...vavai/riv/typAkce
http://linked.open.../riv/zahajeniAkce
number of pages
http://purl.org/ne...btex#hasPublisher
  • Fakulta aplikované informatiky Univerzity Tomáše Bati ve Zlíně
https://schema.org/isbn
  • 978-80-7454-012-7
http://localhost/t...ganizacniJednotka
  • 28140
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software