How to cheat at VoIP security:

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Beteilige Person: Porter, Thomas (VerfasserIn)
Weitere beteiligte Personen: Gough, Michael (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Rockland, MA Syngress 2007, [2011]
Ausgabe:1st ed.
Schriftenreihe:How to Cheat
Schlagwörter:
Links:https://learning.oreilly.com/library/view/-/9781597491693/?ar
Zusammenfassung:The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.
Beschreibung:Online resource; title from title page (Safari, viewed August 18, 2014)
Umfang:1 online resource (1 volume) illustrations
ISBN:9780080553535
0080553532
1597491691
9781597491693