Attributes | Values |
---|
rdf:type
| |
Description
| - The wireless networks play the important role in the modern world. The Wi-Fi networks expand to many parts of common life. If you try scanning for the wireless network, you might always detect a huge of signals everywhere. The wireless is modern. But the range of these networks is wider than many owners think. The wide range of these networks will be dangerous, because the owner occasionally does not reduce the power of the net. The unregulated network will be detected and accessible outside the owner place. And everybody can use it. The paper describes commonly using methods for security testing of Wi-Fi networks. The best solution for testing the network security is the penetration test of designed network. The penetration test is commonly named as the “Pentest”. The pentest is similar than regular hack attack aimed to the destination network. The pentester use the same techniques than real hacker. If the pentest is successful, the network owner must apply the better methods for the securing of the network.
- The wireless networks play the important role in the modern world. The Wi-Fi networks expand to many parts of common life. If you try scanning for the wireless network, you might always detect a huge of signals everywhere. The wireless is modern. But the range of these networks is wider than many owners think. The wide range of these networks will be dangerous, because the owner occasionally does not reduce the power of the net. The unregulated network will be detected and accessible outside the owner place. And everybody can use it. The paper describes commonly using methods for security testing of Wi-Fi networks. The best solution for testing the network security is the penetration test of designed network. The penetration test is commonly named as the “Pentest”. The pentest is similar than regular hack attack aimed to the destination network. The pentester use the same techniques than real hacker. If the pentest is successful, the network owner must apply the better methods for the securing of the network. (en)
|
Title
| - The Penetration Testing Of Wifi Networks
- The Penetration Testing Of Wifi Networks (en)
|
skos:prefLabel
| - The Penetration Testing Of Wifi Networks
- The Penetration Testing Of Wifi Networks (en)
|
skos:notation
| - RIV/70883521:28140/11:43865806!RIV12-MSM-28140___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/70883521:28140/11:43865806
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - pentesting, penetration test, wi-fi, security (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Conference Proceedings Internet, Competitiveness and Organizational Security
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...vavai/riv/projekt
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Fakulta aplikované informatiky Univerzity Tomáše Bati ve Zlíně
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |