Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Waltham, MA
Syngress
[2015]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780124170391/?ar |
Zusammenfassung: | This book shows you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Bates provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. This resource explains the business case for securing VoIP Systems; presents hands-on tools that show how to defend a VoIP network against attack; provides detailed case studies and real world examples drawn from the authors' consulting practice; discusses the pros and cons of implementing VoIP and why it may not be right for everyone; covers the security policies and procedures that need to be in place to keep VoIP communications safe. -- |
Beschreibung: | Includes index. - Online resource; title from PDF title page (Safari, viewed December 12, 2014) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9780124170391 0124170390 9780124171220 0124171222 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047404957 | ||
003 | DE-627-1 | ||
005 | 20240228115730.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2015 xx |||||o 00| ||eng c | ||
020 | |a 9780124170391 |9 978-0-12-417039-1 | ||
020 | |a 0124170390 |9 0-12-417039-0 | ||
020 | |a 9780124171220 |c e-book |9 978-0-12-417122-0 | ||
020 | |a 0124171222 |c e-book |9 0-12-417122-2 | ||
035 | |a (DE-627-1)047404957 | ||
035 | |a (DE-599)KEP047404957 | ||
035 | |a (ORHE)9780124170391 | ||
035 | |a (DE-627-1)047404957 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 004.695 |2 23 | |
100 | 1 | |a Bates, Regis J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Securing VoIP |b keeping your VoIP network safe |c Regis J. (Bud) Bates |
264 | 1 | |a Waltham, MA |b Syngress |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index. - Online resource; title from PDF title page (Safari, viewed December 12, 2014) | ||
520 | |a This book shows you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Bates provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. This resource explains the business case for securing VoIP Systems; presents hands-on tools that show how to defend a VoIP network against attack; provides detailed case studies and real world examples drawn from the authors' consulting practice; discusses the pros and cons of implementing VoIP and why it may not be right for everyone; covers the security policies and procedures that need to be in place to keep VoIP communications safe. -- | ||
650 | 0 | |a Internet telephony |x Security measures | |
650 | 4 | |a Téléphonie Internet ; Sécurité ; Mesures | |
776 | 1 | |z 9780124170391 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124170391 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780124170391/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047404957 |
---|---|
_version_ | 1835903222869393408 |
adam_text | |
any_adam_object | |
author | Bates, Regis J. |
author_facet | Bates, Regis J. |
author_role | aut |
author_sort | Bates, Regis J. |
author_variant | r j b rj rjb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047404957 (DE-599)KEP047404957 (ORHE)9780124170391 |
dewey-full | 004.695 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.695 |
dewey-search | 004.695 |
dewey-sort | 14.695 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02325cam a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-047404957</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115730.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2015 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124170391</subfield><subfield code="9">978-0-12-417039-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124170390</subfield><subfield code="9">0-12-417039-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124171220</subfield><subfield code="c">e-book</subfield><subfield code="9">978-0-12-417122-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124171222</subfield><subfield code="c">e-book</subfield><subfield code="9">0-12-417122-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047404957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780124170391</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404957</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.695</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bates, Regis J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing VoIP</subfield><subfield code="b">keeping your VoIP network safe</subfield><subfield code="c">Regis J. (Bud) Bates</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Online resource; title from PDF title page (Safari, viewed December 12, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book shows you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Bates provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. This resource explains the business case for securing VoIP Systems; presents hands-on tools that show how to defend a VoIP network against attack; provides detailed case studies and real world examples drawn from the authors' consulting practice; discusses the pros and cons of implementing VoIP and why it may not be right for everyone; covers the security policies and procedures that need to be in place to keep VoIP communications safe. --</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphonie Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780124170391</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124170391</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780124170391/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047404957 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:15:51Z |
institution | BVB |
isbn | 9780124170391 0124170390 9780124171220 0124171222 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Syngress |
record_format | marc |
spelling | Bates, Regis J. VerfasserIn aut Securing VoIP keeping your VoIP network safe Regis J. (Bud) Bates Waltham, MA Syngress [2015] ©2015 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index. - Online resource; title from PDF title page (Safari, viewed December 12, 2014) This book shows you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Bates provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. This resource explains the business case for securing VoIP Systems; presents hands-on tools that show how to defend a VoIP network against attack; provides detailed case studies and real world examples drawn from the authors' consulting practice; discusses the pros and cons of implementing VoIP and why it may not be right for everyone; covers the security policies and procedures that need to be in place to keep VoIP communications safe. -- Internet telephony Security measures Téléphonie Internet ; Sécurité ; Mesures 9780124170391 Erscheint auch als Druck-Ausgabe 9780124170391 |
spellingShingle | Bates, Regis J. Securing VoIP keeping your VoIP network safe Internet telephony Security measures Téléphonie Internet ; Sécurité ; Mesures |
title | Securing VoIP keeping your VoIP network safe |
title_auth | Securing VoIP keeping your VoIP network safe |
title_exact_search | Securing VoIP keeping your VoIP network safe |
title_full | Securing VoIP keeping your VoIP network safe Regis J. (Bud) Bates |
title_fullStr | Securing VoIP keeping your VoIP network safe Regis J. (Bud) Bates |
title_full_unstemmed | Securing VoIP keeping your VoIP network safe Regis J. (Bud) Bates |
title_short | Securing VoIP |
title_sort | securing voip keeping your voip network safe |
title_sub | keeping your VoIP network safe |
topic | Internet telephony Security measures Téléphonie Internet ; Sécurité ; Mesures |
topic_facet | Internet telephony Security measures Téléphonie Internet ; Sécurité ; Mesures |
work_keys_str_mv | AT batesregisj securingvoipkeepingyourvoipnetworksafe |