How to cheat at VoIP security

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Porter, Thomas (VerfasserIn)
Weitere Verfasser: Gough, Michael (MitwirkendeR)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Rockland, MA Syngress 2007, [2011]
Ausgabe:1st ed.
Schriftenreihe:How to Cheat
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047647205
003 DE-627-1
005 20240228115628.0
007 cr uuu---uuuuu
008 191023s2007 xx |||||o 00| ||eng c
020 |a 9780080553535  |9 978-0-08-055353-5 
020 |a 0080553532  |9 0-08-055353-2 
020 |a 1597491691  |9 1-59749-169-1 
020 |a 9781597491693  |9 978-1-59749-169-3 
020 |a 9781597491693  |9 978-1-59749-169-3 
035 |a (DE-627-1)047647205 
035 |a (DE-599)KEP047647205 
035 |a (ORHE)9781597491693 
035 |a (DE-627-1)047647205 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 621.385  |2 22 
100 1 |a Porter, Thomas  |e VerfasserIn  |4 aut 
245 1 0 |a How to cheat at VoIP security  |c Thomas Porter, Michael Gough 
250 |a 1st ed. 
264 1 |a Rockland, MA  |b Syngress  |c 2007, [2011] 
300 |a 1 online resource (1 volume)  |b illustrations 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 0 |a How to Cheat 
500 |a Online resource; title from title page (Safari, viewed August 18, 2014) 
520 |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. 
650 0 |a Internet telephony  |x Security measures 
650 0 |a Computer networks  |x Security measures 
650 4 |a Téléphonie Internet ; Sécurité ; Mesures 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures 
700 1 |a Gough, Michael  |e MitwirkendeR  |4 ctb 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781597491693/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047647205
_version_ 1818767301284986880
adam_text
any_adam_object
author Porter, Thomas
author2 Gough, Michael
author2_role ctb
author2_variant m g mg
author_facet Porter, Thomas
Gough, Michael
author_role aut
author_sort Porter, Thomas
author_variant t p tp
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047647205
(DE-599)KEP047647205
(ORHE)9781597491693
dewey-full 621.385
dewey-hundreds 600 - Technology (Applied sciences)
dewey-ones 621 - Applied physics
dewey-raw 621.385
dewey-search 621.385
dewey-sort 3621.385
dewey-tens 620 - Engineering and allied operations
discipline Elektrotechnik / Elektronik / Nachrichtentechnik
edition 1st ed.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02281cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047647205</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115628.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553535</subfield><subfield code="9">978-0-08-055353-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553532</subfield><subfield code="9">0-08-055353-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491691</subfield><subfield code="9">1-59749-169-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597491693</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.385</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Porter, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at VoIP security</subfield><subfield code="c">Thomas Porter, Michael Gough</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007, [2011]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">How to Cheat</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed August 18, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphonie Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gough, Michael</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597491693/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047647205
illustrated Illustrated
indexdate 2024-12-18T08:47:42Z
institution BVB
isbn 9780080553535
0080553532
1597491691
9781597491693
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 volume) illustrations
psigel ZDB-30-ORH
publishDate 2011
publishDateSearch 2007
publishDateSort 2007
publisher Syngress
record_format marc
series2 How to Cheat
spelling Porter, Thomas VerfasserIn aut
How to cheat at VoIP security Thomas Porter, Michael Gough
1st ed.
Rockland, MA Syngress 2007, [2011]
1 online resource (1 volume) illustrations
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
How to Cheat
Online resource; title from title page (Safari, viewed August 18, 2014)
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.
Internet telephony Security measures
Computer networks Security measures
Téléphonie Internet ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
Gough, Michael MitwirkendeR ctb
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781597491693/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Porter, Thomas
How to cheat at VoIP security
Internet telephony Security measures
Computer networks Security measures
Téléphonie Internet ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
title How to cheat at VoIP security
title_auth How to cheat at VoIP security
title_exact_search How to cheat at VoIP security
title_full How to cheat at VoIP security Thomas Porter, Michael Gough
title_fullStr How to cheat at VoIP security Thomas Porter, Michael Gough
title_full_unstemmed How to cheat at VoIP security Thomas Porter, Michael Gough
title_short How to cheat at VoIP security
title_sort how to cheat at voip security
topic Internet telephony Security measures
Computer networks Security measures
Téléphonie Internet ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
topic_facet Internet telephony Security measures
Computer networks Security measures
Téléphonie Internet ; Sécurité ; Mesures
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781597491693/?ar
work_keys_str_mv AT porterthomas howtocheatatvoipsecurity
AT goughmichael howtocheatatvoipsecurity