|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn311537736 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
090302s2009 caua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d CEF
|d OCLCQ
|d NHM
|d DEBSZ
|d OCLCQ
|d OCLCO
|d PR$
|d OCLCQ
|d OCLCF
|d UAB
|d OCLCO
|
019 |
|
|
|a 1044191208
|a 1056390825
|a 1097112722
|
020 |
|
|
|a 9781593271633
|
020 |
|
|
|a 1593271638
|
029 |
1 |
|
|a DEBSZ
|b 355442965
|
035 |
|
|
|a (OCoLC)311537736
|z (OCoLC)1044191208
|z (OCoLC)1056390825
|z (OCoLC)1097112722
|
037 |
|
|
|a CL0500000035
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.8865
|b .P37 2009
|
082 |
0 |
4 |
|a 004.69/5
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dwivedi, Himanshu.
|
245 |
1 |
0 |
|a Hacking VoIP /
|c by Himanshu Dwivedi.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol, Calif. :
|b O'Reilly Media,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xii, 211 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from resource description page.
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a 1. An introduction to VoIP security -- 2. Signaling : SIP security -- 3. Signaling : H.323 security -- 4. Media : RTP security -- 5. Signaling and media : IAX security -- 6. Attacking VoIP infrastructure -- 7. Unconventional VoIP security threats -- 8. Home VoIP solutions -- 9. Securing VoIP -- 10. Auditing VoIP for security best practices.
|
520 |
1 |
|
|a "Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense."--Jacket.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet telephony
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Téléphonie Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Internet telephony
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 blmlsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781593271633/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|