How to cheat at VoIP security:
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Rockland, MA
Syngress
2007, [2011]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | How to Cheat
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781597491693/?ar |
Zusammenfassung: | The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. |
Beschreibung: | Online resource; title from title page (Safari, viewed August 18, 2014) |
Umfang: | 1 online resource (1 volume) illustrations |
ISBN: | 9780080553535 0080553532 1597491691 9781597491693 |
Internformat
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647205 | ||
003 | DE-627-1 | ||
005 | 20240228115628.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780080553535 |9 978-0-08-055353-5 | ||
020 | |a 0080553532 |9 0-08-055353-2 | ||
020 | |a 1597491691 |9 1-59749-169-1 | ||
020 | |a 9781597491693 |9 978-1-59749-169-3 | ||
020 | |a 9781597491693 |9 978-1-59749-169-3 | ||
035 | |a (DE-627-1)047647205 | ||
035 | |a (DE-599)KEP047647205 | ||
035 | |a (ORHE)9781597491693 | ||
035 | |a (DE-627-1)047647205 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 621.385 |2 22 | |
100 | 1 | |a Porter, Thomas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to cheat at VoIP security |c Thomas Porter, Michael Gough |
250 | |a 1st ed. | ||
264 | 1 | |a Rockland, MA |b Syngress |c 2007, [2011] | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a How to Cheat | |
500 | |a Online resource; title from title page (Safari, viewed August 18, 2014) | ||
520 | |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. | ||
650 | 0 | |a Internet telephony |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Téléphonie Internet ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Gough, Michael |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597491693/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647205 |
---|---|
_version_ | 1833357073710055424 |
adam_text | |
any_adam_object | |
author | Porter, Thomas |
author2 | Gough, Michael |
author2_role | ctb |
author2_variant | m g mg |
author_facet | Porter, Thomas Gough, Michael |
author_role | aut |
author_sort | Porter, Thomas |
author_variant | t p tp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647205 (DE-599)KEP047647205 (ORHE)9781597491693 |
dewey-full | 621.385 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.385 |
dewey-search | 621.385 |
dewey-sort | 3621.385 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02281cam a22004812c 4500</leader><controlfield tag="001">ZDB-30-ORH-047647205</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115628.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553535</subfield><subfield code="9">978-0-08-055353-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553532</subfield><subfield code="9">0-08-055353-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491691</subfield><subfield code="9">1-59749-169-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597491693</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.385</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Porter, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at VoIP security</subfield><subfield code="c">Thomas Porter, Michael Gough</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007, [2011]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">How to Cheat</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed August 18, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphonie Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gough, Michael</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597491693/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647205 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:53Z |
institution | BVB |
isbn | 9780080553535 0080553532 1597491691 9781597491693 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
series2 | How to Cheat |
spelling | Porter, Thomas VerfasserIn aut How to cheat at VoIP security Thomas Porter, Michael Gough 1st ed. Rockland, MA Syngress 2007, [2011] 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How to Cheat Online resource; title from title page (Safari, viewed August 18, 2014) The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Gough, Michael MitwirkendeR ctb |
spellingShingle | Porter, Thomas How to cheat at VoIP security Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | How to cheat at VoIP security |
title_auth | How to cheat at VoIP security |
title_exact_search | How to cheat at VoIP security |
title_full | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_fullStr | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_full_unstemmed | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_short | How to cheat at VoIP security |
title_sort | how to cheat at voip security |
topic | Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
work_keys_str_mv | AT porterthomas howtocheatatvoipsecurity AT goughmichael howtocheatatvoipsecurity |