|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn613958930 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
100513s2010 maua ob 001 0 eng d |
010 |
|
|
|a 2010014491
|
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d CDX
|d OCLCQ
|d N$T
|d YDXCP
|d EBLCP
|d OCLCQ
|d B24X7
|d UMI
|d OCLCQ
|d VLB
|d DEBSZ
|d OCLCQ
|d OCLCF
|d OCLCQ
|d COO
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d D6H
|d CEF
|d OCLCQ
|d WYU
|d AUD
|d LEAUB
|d UKAHL
|d OL$
|d OCLCQ
|d BRF
|d VT2
|d LVT
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB002364
|2 bnb
|
016 |
7 |
|
|a 015455625
|2 Uk
|
019 |
|
|
|a 664571388
|a 765143747
|a 810455893
|a 1064108988
|a 1102533415
|a 1153050722
|a 1192335156
|a 1229179720
|a 1240533206
|a 1264893974
|
020 |
|
|
|a 9781597495479
|
020 |
|
|
|a 1597495476
|
020 |
|
|
|a 9781597495486
|q (electronic bk.)
|
020 |
|
|
|a 1597495484
|q (electronic bk.)
|
020 |
0 |
|
|a 9781282738249
|q (online)
|
020 |
|
|
|a 1282738240
|
029 |
1 |
|
|a AU@
|b 000045964048
|
029 |
1 |
|
|a AU@
|b 000053263239
|
029 |
1 |
|
|a CHBIS
|b 006513802
|
029 |
1 |
|
|a CHNEW
|b 001009666
|
029 |
1 |
|
|a CHVBK
|b 174528841
|
029 |
1 |
|
|a DEBBG
|b BV042300684
|
029 |
1 |
|
|a DEBSZ
|b 378295268
|
029 |
1 |
|
|a DEBSZ
|b 399119248
|
029 |
1 |
|
|a DEBSZ
|b 430881452
|
029 |
1 |
|
|a GBVCP
|b 785364005
|
029 |
1 |
|
|a NZ1
|b 13448980
|
029 |
1 |
|
|a NZ1
|b 15187744
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:9910110230005765
|
035 |
|
|
|a (OCoLC)613958930
|z (OCoLC)664571388
|z (OCoLC)765143747
|z (OCoLC)810455893
|z (OCoLC)1064108988
|z (OCoLC)1102533415
|z (OCoLC)1153050722
|z (OCoLC)1192335156
|z (OCoLC)1229179720
|z (OCoLC)1240533206
|z (OCoLC)1264893974
|
037 |
|
|
|a 1094153:10886751
|b Elsevier Science & Technology
|n http://www.sciencedirect.com
|
050 |
|
4 |
|a TK5102.85
|b .Y67 2010
|
072 |
|
7 |
|a TEC
|x 041000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.382/1
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a York, Dan.
|
245 |
1 |
0 |
|a Seven deadliest Unified Communications attacks /
|c Dan York ; technical editor, Dustin D. Trammell.
|
260 |
|
|
|a Burlington, MA :
|b Syngress,
|c ©2010.
|
300 |
|
|
|a 1 online resource (xxiv, 164 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Syngress seven deadliest attacks series
|
520 |
|
|
|a Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
|
505 |
0 |
|
|a Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.
|
505 |
0 |
|
|a The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Telecommunication
|x Security measures.
|
650 |
|
6 |
|a Télécommunications
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Telecommunications.
|2 bisacsh
|
650 |
|
7 |
|a Telecommunication
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a York, Dan.
|t Seven deadliest Unified Communications attacks.
|d Burlington, MA : Syngress, ©2010
|z 9781597495479
|z 1597495476
|w (DLC) 2010014491
|w (OCoLC)460059013
|
830 |
|
0 |
|a Syngress seven deadliest attacks series.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597495479/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH23095070
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00037232
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 14948505
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL566735
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 334690
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3250469
|
994 |
|
|
|a 92
|b IZTAP
|