Illustration

Biographie et livres de Frank Thornton

Découvrez tout l'univers de l'auteur en livre numérique
Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in information security and wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion.
Découvrez tous ses livres

Dernière parution

Téléchargez le livre :  Kismet Hacking
Ajouter à ma liste d'envies
Kismet Hacking

Brad Haines , Michael J. Schearer , Frank Thornton


Syngress

2008-08-08

epub sans DRM

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in...

47,42

Lire plus

Tous les ebooks de Frank Thornton en PDF et EPUB


3  résultat(s)
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
Ajouter à ma liste d'envies

How to Cheat at Deploying and Securing RFID


Paul Sanghera , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Ajouter à ma liste d'envies

WarDriving and Wireless Penetration Testing


Brian Baker , Chris Hurley , Russ Rogers , Frank Thornton


Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Parution : 2006-11-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  RFID Security
Ajouter à ma liste d'envies

RFID Security


Chris Lanthem , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Parution : 2006-05-25
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés