How to cheat at VoIP security
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA
Syngress
2007, [2011]
|
Ausgabe: | 1st ed. |
Schriftenreihe: | How to Cheat
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047647205 | ||
003 | DE-627-1 | ||
005 | 20240228115628.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780080553535 |9 978-0-08-055353-5 | ||
020 | |a 0080553532 |9 0-08-055353-2 | ||
020 | |a 1597491691 |9 1-59749-169-1 | ||
020 | |a 9781597491693 |9 978-1-59749-169-3 | ||
020 | |a 9781597491693 |9 978-1-59749-169-3 | ||
035 | |a (DE-627-1)047647205 | ||
035 | |a (DE-599)KEP047647205 | ||
035 | |a (ORHE)9781597491693 | ||
035 | |a (DE-627-1)047647205 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 621.385 |2 22 | |
100 | 1 | |a Porter, Thomas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a How to cheat at VoIP security |c Thomas Porter, Michael Gough |
250 | |a 1st ed. | ||
264 | 1 | |a Rockland, MA |b Syngress |c 2007, [2011] | |
300 | |a 1 online resource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a How to Cheat | |
500 | |a Online resource; title from title page (Safari, viewed August 18, 2014) | ||
520 | |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. | ||
650 | 0 | |a Internet telephony |x Security measures | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Téléphonie Internet ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures | |
700 | 1 | |a Gough, Michael |e MitwirkendeR |4 ctb | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597491693/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047647205 |
---|---|
_version_ | 1818767301284986880 |
adam_text | |
any_adam_object | |
author | Porter, Thomas |
author2 | Gough, Michael |
author2_role | ctb |
author2_variant | m g mg |
author_facet | Porter, Thomas Gough, Michael |
author_role | aut |
author_sort | Porter, Thomas |
author_variant | t p tp |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047647205 (DE-599)KEP047647205 (ORHE)9781597491693 |
dewey-full | 621.385 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.385 |
dewey-search | 621.385 |
dewey-sort | 3621.385 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02281cam a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047647205</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115628.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553535</subfield><subfield code="9">978-0-08-055353-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553532</subfield><subfield code="9">0-08-055353-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491691</subfield><subfield code="9">1-59749-169-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491693</subfield><subfield code="9">978-1-59749-169-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047647205</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597491693</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047647205</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.385</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Porter, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at VoIP security</subfield><subfield code="c">Thomas Porter, Michael Gough</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">2007, [2011]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">How to Cheat</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed August 18, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphonie Internet ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gough, Michael</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597491693/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047647205 |
illustrated | Illustrated |
indexdate | 2024-12-18T08:47:42Z |
institution | BVB |
isbn | 9780080553535 0080553532 1597491691 9781597491693 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 volume) illustrations |
psigel | ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
series2 | How to Cheat |
spelling | Porter, Thomas VerfasserIn aut How to cheat at VoIP security Thomas Porter, Michael Gough 1st ed. Rockland, MA Syngress 2007, [2011] 1 online resource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier How to Cheat Online resource; title from title page (Safari, viewed August 18, 2014) The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Gough, Michael MitwirkendeR ctb TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781597491693/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Porter, Thomas How to cheat at VoIP security Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
title | How to cheat at VoIP security |
title_auth | How to cheat at VoIP security |
title_exact_search | How to cheat at VoIP security |
title_full | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_fullStr | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_full_unstemmed | How to cheat at VoIP security Thomas Porter, Michael Gough |
title_short | How to cheat at VoIP security |
title_sort | how to cheat at voip security |
topic | Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
topic_facet | Internet telephony Security measures Computer networks Security measures Téléphonie Internet ; Sécurité ; Mesures Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781597491693/?ar |
work_keys_str_mv | AT porterthomas howtocheatatvoipsecurity AT goughmichael howtocheatatvoipsecurity |