Inside Radio: An Attack and Defense Guide, 1st ed. 2018

Authors:

Language: English

Approximative price 73.84 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Inside Radio: An Attack and Defense Guide
Publication date:
Support: Print on demand

Approximative price 73.84 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Inside Radio: An Attack and Defense Guide
Publication date:
Support: Print on demand

This book discusses the security issues in a wide range of wireless devices and systems, such as RFID, Bluetooth, ZigBee, GSM, LTE, and GPS. It collects the findings of recent research by the UnicornTeam at 360 Technology, and reviews the state-of-the-art literature on wireless security. The book also offers detailed case studies and theoretical treatments ? specifically it lists numerous laboratory procedures, results, plots, commands and screenshots from real-world experiments. It is a valuable reference guide for practitioners and researchers who want to learn more about the advanced research findings and use the off-the-shelf tools to explore the wireless world.

Chapter1 Overview of wireless security.- Chapter 2 RFID security.- Chapter 3 Wireless system in 433/315 MHz band.- Chapter 4 Aviation radios.- Chapter 5 Bluetooth related.- Chapter 6 Zigbee.- Chapter 7 Cellular network.- Chapter 8 Satellite communication.- Chapter 9 Hacking tool introduction.

Qing YANG is the founder of UnicornTeam & the head of the Radio Security Research Department at 360 Technology. He has vast experience in information security area. He has presented at Black Hat, DEFCON, CanSecWest, HITB, Ruxcon, POC, XCon, China ISC etc.

Lin HUANG is a senior wireless security researcher and SDR technology expert at 360 Technology. Her interests include security issues in wireless communication, especially cellular network security. She was a speaker at Black Hat, DEFCON,  and HITB security conferences. She is 360 Technology’s 3GPP SA3 delegate.

This book is a joint effort by the entire UnicornTeam, including Qiren GU, Jun LI, Haoqi SHAN, Yingtao ZENG, and Wanqiao ZHANG etc.

Provides a practical guide, introducing real-world industrial cases in wireless security attacks and defense

Powered by the core researchers from 360 Technology, a successful Chinese Internet security company

Offers non-experts a comprehensive overview of security issues in different radio networks