Cargando…

Asterisk hacking.

Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Brashars, Joshua
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Syngress, 2007.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocn166351802
003 OCoLC
005 20231117015044.0
006 m o d
007 cr cn|||||||||
008 070828s2007 xx o 000 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OPELS  |d OCLCQ  |d DKDLA  |d OCLCQ  |d IDEBK  |d DEBSZ  |d OCLCQ  |d OCLCF  |d D6H  |d LEAUB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 488133683  |a 767763202  |a 823830468  |a 823900168  |a 824091406  |a 824139625 
020 |a 9781597491518 
020 |a 1597491519 
020 |a 1281071897 
020 |a 9781281071897 
035 |a (OCoLC)166351802  |z (OCoLC)488133683  |z (OCoLC)767763202  |z (OCoLC)823830468  |z (OCoLC)823900168  |z (OCoLC)824091406  |z (OCoLC)824139625 
050 4 |a TK5105.8865  |b .A88 2007eb 
072 7 |a PBW  |2 bicssc 
082 0 4 |a 006.5  |2 22 
245 0 0 |a Asterisk hacking. 
260 |a [Place of publication not identified] :  |b Syngress,  |c 2007. 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles. 
505 0 |a What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking. 
588 0 |a Print version record. 
650 0 |a Internet telephony  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a T�el�ephonie Internet  |0 (CaQQLa)201-0312636  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Brashars, Joshua. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597491518  |z Texto completo