More from this Author
Found 11 books by Chris Hurley

Wireless Security: Know It All
by Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Stephen A. Rackley, John Rittinghouse, , CISM, James F. Ransome, , CISM, CISSP, Timothy Stapko, George L. Stefanek, Frank Thornton, Chris Lanthem, Jon S. Wilson

IT Security Interviews Exposed
by Chris Butler, Russ Rogers, Mason Ferratt, Greg Miles, Ed Fuller, Chris Hurley, Rob Cameron, Brian Kirouac

WarDriving and Wireless Penetration Testing
by Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker

Stealing the Network: How to Own an Identity
by Ryan Russell, Peter A. Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch

Penetration Tester's Open Source Toolkit
by Jeremy Faircloth, Chris Hurley

Wireless Security: Know It All
by Praphul Chandra, James F. Ransome CISM CISSP, Timothy Stapko, George L. Stefanek, Praphul Chandra, Frank Thornton, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Frank Thornton, Steve A. Rackley, John Rittinghouse CISM, James F. Ransome CISM CISSP, Timothy Stapko, George L. Stefanek, Chris Lanthem, Jon S. Wilson, Dan Bensky, Tony Bradley, Chris Hurley, Steve A. Rackley, John Rittinghouse CISM

WarDriving and Wireless Penetration Testing
by Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker

Stealing the Network: How to Own an Identity
by Ryan Russell, Peter A. Riley, Jay Beale, Chris Hurley, Tom Parker, Brian Hatch

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
by Chris Hurley, Johnny Long, Aaron W. Bayles, Ed Brindley

OS X Exploits and Defense
by Chris Hurley, Johnny Long, David Harley, Paul Baccas, Kevin Finisterre, Larry H., Gary Porteus

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
by Chris Hurley, Johnny Long, Aaron W. Bayles, Ed Brindley