|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn889254206 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140826t20072011maua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d DEBSZ
|d OCLCQ
|d OCLCF
|d CNCGM
|d OCLCQ
|d CEF
|d UAB
|d AU@
|d VLY
|d OCLCO
|d OCLCQ
|
020 |
|
|
|a 9780080553535
|
020 |
|
|
|a 0080553532
|
020 |
|
|
|a 1597491691
|
020 |
|
|
|a 9781597491693
|
020 |
|
|
|z 9781597491693
|
029 |
1 |
|
|a DEBBG
|b BV042182458
|
029 |
1 |
|
|a DEBSZ
|b 417231415
|
029 |
1 |
|
|a GBVCP
|b 882733230
|
035 |
|
|
|a (OCoLC)889254206
|
037 |
|
|
|a CL0500000473
|b Safari Books Online
|
050 |
|
4 |
|a TK5105.8865
|b .P67 2011
|
082 |
0 |
4 |
|a 621.385
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Porter, Thomas.
|
245 |
1 |
0 |
|a How to cheat at VoIP security /
|c Thomas Porter, Michael Gough.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Rockland, MA :
|b Syngress,
|c ©2007, [2011]
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a How to Cheat
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 18, 2014).
|
505 |
0 |
|
|a Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup.
|
520 |
|
|
|a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Internet telephony
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Téléphonie Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
700 |
1 |
|
|a Gough, Michael.
|
830 |
|
0 |
|a "How to cheat--"
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597491693/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|