|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn870459867 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140213s2014 nyua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d B24X7
|d S4S
|d COO
|d OCLCO
|d DEBBG
|d DEBSZ
|d YDXCP
|d OCLCQ
|d OCLCF
|d TOH
|d OCLCO
|d YDX
|d N$T
|d OCLCQ
|d KSU
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1312327388
|
020 |
|
|
|a 9780071798778
|q (electronic book)
|
020 |
|
|
|a 0071798773
|q (electronic book)
|
020 |
|
|
|z 9780071798761
|
020 |
|
|
|z 0071798765
|
029 |
1 |
|
|a AU@
|b 000053305542
|
029 |
1 |
|
|a DEBSZ
|b 40433704X
|
035 |
|
|
|a (OCoLC)870459867
|z (OCoLC)1312327388
|
037 |
|
|
|a CL0500000385
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.8865
|b .C65 2014
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220422
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Collier, Mark D.,
|e author.
|
245 |
1 |
0 |
|a Hacking exposed :
|b unified communications & VoIP security secrets & solutions /
|c Mark Collier, David Endler.
|
250 |
|
|
|a 2nd ed.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill Education,
|c ©2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a The secure beginner's guides: security smarts for the self-guided IT professional
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
8 |
|
|a Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation.
|
520 |
|
|
|a "Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"--
|c Provided by publisher
|
588 |
0 |
|
|a Online resource; title from PDF title page (viewed April 22, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet telephony
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Téléphonie Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
700 |
1 |
|
|a Endler, David.
|
776 |
0 |
8 |
|i Print version:
|a Collier, Mark D.
|t Hacking exposed.
|b Second edition.
|d New York : McGraw-Hill Education, [2014]
|z 9780071798761
|w (DLC) 2013044616
|w (OCoLC)864709612
|
830 |
|
0 |
|a Secure beginner's guides.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071798761/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00059135
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2688282
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12087467
|
994 |
|
|
|a 92
|b IZTAP
|