|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn868231719 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140116s2014 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d COO
|d DEBBG
|d GGVRL
|d DEBSZ
|d B24X7
|d OCLCA
|d YDXCP
|d OCLCQ
|d OCLCF
|d OCLCQ
|d LIV
|d OCLCQ
|d CEF
|d AU@
|d WYU
|d VLY
|d BRF
|d OCLCO
|d CZL
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 966353592
|a 1058184921
|a 1162217480
|a 1295596664
|a 1300496644
|
020 |
|
|
|a 9780124046054
|
020 |
|
|
|a 0124046053
|
020 |
|
|
|a 1597499927
|
020 |
|
|
|a 9781597499927
|
020 |
|
|
|z 9781597499927
|
029 |
1 |
|
|a AU@
|b 000053308514
|
029 |
1 |
|
|a DEBBG
|b BV041778385
|
029 |
1 |
|
|a DEBSZ
|b 40432875X
|
029 |
1 |
|
|a GBVCP
|b 882723030
|
035 |
|
|
|a (OCoLC)868231719
|z (OCoLC)966353592
|z (OCoLC)1058184921
|z (OCoLC)1162217480
|z (OCoLC)1295596664
|z (OCoLC)1300496644
|
037 |
|
|
|a CL0500000361
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.8865
|b .G73 2014
|
082 |
0 |
4 |
|a 658.4/78
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Grant, Nicholas,
|d 1978-
|
245 |
1 |
0 |
|a Unified communications forensics :
|b anatomy of common UC attacks /
|c Nicholas Grant, Joseph W. Shaw II ; technical editor, Jamey B. Tubbs.
|
260 |
|
|
|a Waltham, MA :
|b Syngress,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed January 7, 2014).
|
505 |
0 |
|
|a 1. A brief introduction -- 2. Spit, phishing, and other social outings -- 3. Misconfiguration begat toll fraud and other VoIP mischief -- 4. Mixed signals -- 5. Can you hear me now -- 6. When SIP attacks -- 7. Hacking the network -- 8. VoIP bots -- 9. Introduction to digital forensics -- 10. Security best practices -- VoIP implementation.
|
520 |
|
|
|a Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
|
504 |
|
|
|a Includes bibliographical references and index.
|
546 |
|
|
|a English.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet telephony.
|
650 |
|
0 |
|a Computer network protocols.
|
650 |
|
0 |
|a Forensic sciences.
|
650 |
|
2 |
|a Forensic Sciences
|
650 |
|
6 |
|a Téléphonie Internet.
|
650 |
|
6 |
|a Protocoles de réseaux d'ordinateurs.
|
650 |
|
6 |
|a Criminalistique.
|
650 |
|
7 |
|a forensic science.
|2 aat
|
650 |
|
7 |
|a Computer network protocols
|2 fast
|
650 |
|
7 |
|a Forensic sciences
|2 fast
|
650 |
|
7 |
|a Internet telephony
|2 fast
|
700 |
1 |
|
|a Shaw, Joseph W.,
|c II,
|d 1976-
|
776 |
0 |
|
|z 1597499927
|
776 |
0 |
|
|z 1299981240
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597499927/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00056581
|
938 |
|
|
|a Cengage Learning
|b GVRL
|n GVRL6ZUS
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11254750
|
994 |
|
|
|a 92
|b IZTAP
|