Prikaz osnovnih podataka o dokumentu

dc.creatorČisar, P.
dc.creatorMaravić Čisar, S.
dc.date.accessioned2023-12-11T13:16:29Z
dc.date.available2023-12-11T13:16:29Z
dc.date.issued2018
dc.identifier.issnISSN 1584-2665 (printed editions, in two fascicules)
dc.identifier.issnISSN: 2601-2332 (online, all four fascicules)
dc.identifier.urihttp://jakov.kpu.edu.rs/handle/123456789/1528
dc.description.abstractThe topic of this paper is related to the wireless network security problems. For identifying existing security weaknesses, there is a variety of approaches among which is Kali Linux operating system. General cracking procedure of wireless networks consists of several steps. The efficiency of cracking the key and determining the password are the two essentials on which the effectivenss of the procedure depends on. This phase of cracking is also the most demanding. A large collection of different tools for vulnerability assessment and penetration testing designed primarily for ethical hacking is undoubtedly the benefit of this operating system.sr
dc.language.isoensr
dc.publisherTimisoara : University Politehnicasr
dc.rightsrestrictedAccesssr
dc.sourceANNALS of the Faculty Engineering Hunedoara – International Journal of Engineering (Online)sr
dc.subjectwireless networksr
dc.subjectsecurity weaknessessr
dc.subjectvulnerability assessmentsr
dc.subjectpenetration testingsr
dc.titleEthical Hacking of Wireless Networks in Kali Linux Environmentsr
dc.typearticlesr
dc.rights.licenseARRsr
dc.citation.volume16
dc.citation.issue3
dc.citation.spage181
dc.citation.epage186
dc.identifier.rcubhttps://hdl.handle.net/21.15107/rcub_jakov_1528
dc.type.versionpublishedVersionsr


Dokumenti

Thumbnail

Ovaj dokument se pojavljuje u sledećim kolekcijama

Prikaz osnovnih podataka o dokumentu