Hacking exposed VoIP : voice over IP security secrets and solutions / David Endler, Mark Collier

Por: Endler, DavidColaborador(es): Collier, MarkTipo de material: TextoTextoDetalles de publicación: Madrid : McGraw-Hill, 2007 Descripción: XXVII, 539 p. ; 23 cmISBN: 978-0-07-226364-0Tema(s): Seguridad informáticaResumen: "The Hacking Exposed" series has sold more than 500,000 copies worldwide. It includes the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples, and VoIP security tools.Resumen: Índice: Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: Infrastructure Denial of Service Chapter 5: Network Eavesdropping Chapter 6: Network and Interception Application Part III: Exploiting the VoIP Network Chapter 7: Cisco Unified Call Manager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Technologies Part IV : VoIP Session and Application Hacking Chapter 11: Malformed Protocol Hacking (Fuzzing) Chapter 12: Disruption of Se... Etc.
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Inicie sesión para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca de origen Signatura URL Estado Fecha de vencimiento Código de barras Reserva de ítems
Manuales 03. BIBLIOTECA INGENIERÍA PUERTO REAL
681.3/END/hac (Navegar estantería(Abre debajo)) Texto completo Disponible   Ubicación en estantería | Bibliomaps® 3743156583
Total de reservas: 0

Índice

Bibliografía

"The Hacking Exposed" series has sold more than 500,000 copies worldwide. It includes the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples, and VoIP security tools.

Índice: Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: Infrastructure Denial of Service Chapter 5: Network Eavesdropping Chapter 6: Network and Interception Application Part III: Exploiting the VoIP Network Chapter 7: Cisco Unified Call Manager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Technologies Part IV : VoIP Session and Application Hacking Chapter 11: Malformed Protocol Hacking (Fuzzing) Chapter 12: Disruption of Se... Etc.

No hay comentarios en este titulo.

para aportar su opinión.

Con tecnología Koha