Cargando…

How to cheat at VoIP security /

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Porter, Thomas
Otros Autores: Gough, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, ©2007, [2011]
Edición:1st ed.
Colección:"How to cheat--"
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn889254206
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 140826t20072011maua o 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d DEBBG  |d DEBSZ  |d OCLCQ  |d OCLCF  |d CNCGM  |d OCLCQ  |d CEF  |d UAB  |d AU@  |d VLY  |d OCLCO  |d OCLCQ 
020 |a 9780080553535 
020 |a 0080553532 
020 |a 1597491691 
020 |a 9781597491693 
020 |z 9781597491693 
029 1 |a DEBBG  |b BV042182458 
029 1 |a DEBSZ  |b 417231415 
029 1 |a GBVCP  |b 882733230 
035 |a (OCoLC)889254206 
037 |a CL0500000473  |b Safari Books Online 
050 4 |a TK5105.8865  |b .P67 2011 
082 0 4 |a 621.385  |2 22 
049 |a UAMI 
100 1 |a Porter, Thomas. 
245 1 0 |a How to cheat at VoIP security /  |c Thomas Porter, Michael Gough. 
250 |a 1st ed. 
260 |a Rockland, MA :  |b Syngress,  |c ©2007, [2011] 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a How to Cheat 
588 0 |a Online resource; title from title page (Safari, viewed August 18, 2014). 
505 0 |a Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup. 
520 |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet telephony  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Téléphonie Internet  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Gough, Michael. 
830 0 |a "How to cheat--" 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491693/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP