---
product_id: 1704020
title: "Hacking Exposed Wireless: Wireless Security Secrets & Solutions"
brand: "johnny cachejoshua wrightvincent liu"
price: "€ 114.24"
currency: EUR
in_stock: true
reviews_count: 9
url: https://www.desertcart.at/products/1704020-hacking-exposed-wireless-wireless-security-secrets-and-solutions
store_origin: AT
region: Austria
---

# Hacking Exposed Wireless: Wireless Security Secrets & Solutions

**Brand:** johnny cachejoshua wrightvincent liu
**Price:** € 114.24
**Availability:** ✅ In Stock

## Quick Answers

- **What is this?** Hacking Exposed Wireless: Wireless Security Secrets & Solutions by johnny cachejoshua wrightvincent liu
- **How much does it cost?** € 114.24 with free shipping
- **Is it available?** Yes, in stock and ready to ship
- **Where can I buy it?** [www.desertcart.at](https://www.desertcart.at/products/1704020-hacking-exposed-wireless-wireless-security-secrets-and-solutions)

## Best For

- johnny cachejoshua wrightvincent liu enthusiasts

## Why This Product

- Trusted johnny cachejoshua wrightvincent liu brand quality
- Free international shipping included
- Worldwide delivery with tracking
- 15-day hassle-free returns

## Description

Full description not available

## Images

![Hacking Exposed Wireless: Wireless Security Secrets & Solutions - Image 1](https://m.media-amazon.com/images/I/71pWd2buPiL.jpg)

## Customer Reviews

### ⭐⭐⭐⭐⭐ 







  
  
    Great Introductory Book for Wireless Hacking
  

*by A***W on Reviewed in the United States 🇺🇸 on November 6, 2010*

From a beginner's perspective, this book is great.  It offers a broad introduction to 802.11, Bluetooth, ZigBee, and DECT theory, as well as scanning, enumeration, and exploitation techniques.  Additionally, the first chapter does a great job of recommending various 802.11 wireless devices.  The book's teaching format is not OS-specific either, as the authors will show how to use different applications in different OSs (i.e., using Chanelyzer in Windows, or Kismet in Linux).What you should expect from this book is an INTRODUCTION to wireless hacking.  Like I stated earlier, this book offers broad coverage of various techniques.  The authors touch on different subjects, but they do not delve waste-deep into the details of them.  Don't expect a WHOLE chapter dedicated to instruction on the aircrack-ng suite, but do expect enough instruction on how to start and run it.  There are whole books and websites dedicated to teaching many of the programs covered in this one text.The authors do a very good job of teaching you how to defeat different forms of wireless security (SSID hiding, MAC filtering, WEP, WPA, etc.).  For example, a majority of the text moves in a very logical pattern - first, you learn how to scan and identify a target wireless network.  You're then taught how to defeat MAC filtering (if it is in place).  Afterwards, you move on to encryption cracking.  Finally, you're taught a bit of exploitation.Don't think that reading this book will turn you into a "master Wi-Fi cracking Jedi" - this mindset will only set you up for disappointment.  Think of this book as a "gateway," arming you with the knowledge needed to begin a new career/hobby/whatever.  After reading, it's up to you to keep learning more about the different subjects this book touches on, and maybe even discovering some vulnerabilities and/or exploits on your own.The following lists the chapters in the books, as well as any notes:Part 1 - Hacking 802.11 Wireless Technology1.) Introduction to 802.11 Hacking** Very basic intro to 802.11 theory and devices. Recommended for beginners, as the device recommendations are on-point2.) Scanning and Enumerating 802.11 Networks3.) Attacking 802.11 Wireless Networks** The "bread and butter" of the book, teaching you how to crack a WEP network with data/packets recovered from the previous chapter.  Very nice "Bringing it all together" section at the end that gives you the "big picture" of defeating a wireless network with a hidden SSID, MAC filtering, and WEP encryption.4.) Attacking WPA-Protected 802.11 Networks** Nice chapter teaching you about the vulnerabilities of WPA (i.e., decrypting network traffic, cracking pre-shared keys, etc.)Part II - Hacking 802.11 Clients5.) Attack 802.11 Wireless Clients** Nice coverage of Metasploit Framework, Evil DNSs, ARP spoofing, injection, and HTTPS cookie stealing6.) Taking it All The Way: Bridging the Airgap from OS X7.) Taking it All The Way: Bridging the Airgap from WindowsPart III - Hacking Additional Wireless Technologies** The last 1/4 of the book was dedicated to the below-listed wireless technologies.  Don't expect too much subject coverage on them, but then again, they are not as widely-deployed as Wi-Fi.8.) Bluetooth Scanning and Reconnaissance9.) Bluetooth Eavesdropping10.) Attacking and Exploiting Bluetooth11.) Hack ZigBee12.) Hack DECT

### ⭐⭐ 







  
  
    First 3 chapters were fine. Then it was all Linux.
  

*by K***R on Reviewed in the United States 🇺🇸 on October 4, 2012*

The first three chapters were helpful/useful to me. After that it became Linux intensive. If you really want to hack I guess Linux is the way to go. For us windows guys this will have limited appeal beyond chapter 3. If you know Linux you may may get more out of this. I have some network background. I have CCNA and CCNA Wireless as well as CWNA and about 15 years in the industry in various support roles. Maybe great for certain audiences, it was not that useful to me.

### ⭐⭐⭐⭐⭐ 







  
  
    Excellent overview
  

*by L***S on Reviewed in the United States 🇺🇸 on August 3, 2011*

I m not a hacker, not even a script kiddy man, just a sysadmin wich has to cope with the desirata and problems of a huge administration with too little or too late formation.And i m also a father of several teens withe several pc and security problems.This book show me what i need most : a roadmap of the different problems , risks and tools in wifi world . With this organised knowledge i will much better be able to cope with daily activities :  What tools i need at work ?  What tools i need at home ?  For bothh what tests and verifications should i complete regularly ?

---

## Why Shop on Desertcart?

- 🛒 **Trusted by 1.3+ Million Shoppers** — Serving international shoppers since 2016
- 🌍 **Shop Globally** — Access 737+ million products across 21 categories
- 💰 **No Hidden Fees** — All customs, duties, and taxes included in the price
- 🔄 **15-Day Free Returns** — Hassle-free returns (30 days for PRO members)
- 🔒 **Secure Payments** — Trusted payment options with buyer protection
- ⭐ **TrustPilot Rated 4.5/5** — Based on 8,000+ happy customer reviews

**Shop now:** [https://www.desertcart.at/products/1704020-hacking-exposed-wireless-wireless-security-secrets-and-solutions](https://www.desertcart.at/products/1704020-hacking-exposed-wireless-wireless-security-secrets-and-solutions)

---

*Product available on Desertcart Austria*
*Store origin: AT*
*Last updated: 2026-05-04*