Hacking exposed VoIP : voice over IP security secrets and solutions / David Endler, Mark Collier
Tipo de material: TextoDetalles de publicación: Madrid : McGraw-Hill, 2007 Descripción: XXVII, 539 p. ; 23 cmISBN: 978-0-07-226364-0Tema(s): Seguridad informáticaResumen: "The Hacking Exposed" series has sold more than 500,000 copies worldwide. It includes the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples, and VoIP security tools.Resumen: Índice: Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: Infrastructure Denial of Service Chapter 5: Network Eavesdropping Chapter 6: Network and Interception Application Part III: Exploiting the VoIP Network Chapter 7: Cisco Unified Call Manager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Technologies Part IV : VoIP Session and Application Hacking Chapter 11: Malformed Protocol Hacking (Fuzzing) Chapter 12: Disruption of Se... Etc.Tipo de ítem | Biblioteca de origen | Signatura | URL | Estado | Fecha de vencimiento | Código de barras | Reserva de ítems |
---|---|---|---|---|---|---|---|
Manuales | 03. BIBLIOTECA INGENIERÍA PUERTO REAL | 681.3/END/hac (Navegar estantería(Abre debajo)) | Texto completo | Disponible Ubicación en estantería | Bibliomaps® | 3743156583 |
Índice
Bibliografía
"The Hacking Exposed" series has sold more than 500,000 copies worldwide. It includes the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples, and VoIP security tools.
Índice: Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: Infrastructure Denial of Service Chapter 5: Network Eavesdropping Chapter 6: Network and Interception Application Part III: Exploiting the VoIP Network Chapter 7: Cisco Unified Call Manager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Technologies Part IV : VoIP Session and Application Hacking Chapter 11: Malformed Protocol Hacking (Fuzzing) Chapter 12: Disruption of Se... Etc.
No hay comentarios en este titulo.