語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Unified communications forensics = a...
~
Shaw, Joseph, (II,) (1976-)
Unified communications forensics = anatomy of common UC attacks /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Unified communications forensics/ Nicholas Grant & Joseph Shaw II ; technical editor, Jamey B. Tubbs, CISSP, ENCE, SCERS, CEH.
其他題名:
anatomy of common UC attacks /
作者:
Grant, Nicholas,
其他作者:
Shaw, Joseph,
出版者:
Amsterdam :Syngress is an imprint of Elsevier, : 2014.,
面頁冊數:
xvii, 149 p. :ill. ; : 24 cm.;
附註:
Includes index.
標題:
Internet telephony. -
電子資源:
click for full text (2015 TAEBDC PDA eBooks Trial, Trial Period: 2015.6.3-2015.12.31)
ISBN:
9781597499927 (electronic bk.)
Unified communications forensics = anatomy of common UC attacks /
Grant, Nicholas,1978-
Unified communications forensics
anatomy of common UC attacks /[electronic resource] :Nicholas Grant & Joseph Shaw II ; technical editor, Jamey B. Tubbs, CISSP, ENCE, SCERS, CEH. - Amsterdam :Syngress is an imprint of Elsevier,2014. - xvii, 149 p. :ill. ;24 cm.
Includes index.
Machine generated contents note: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--
ISBN: 9781597499927 (electronic bk.)
LCCN: 2013023565Subjects--Topical Terms:
567455
Internet telephony.
LC Class. No.: TK5105.8865 / .G73 2014
Dewey Class. No.: 658.4/78
Unified communications forensics = anatomy of common UC attacks /
LDR
:02019cam a2200241 a 4500
001
810535
005
20140702195013.0
008
150720s2014 ne a s 001 0 eng
010
$a
2013023565
020
$a
9781597499927 (electronic bk.)
020
$a
9781597499927
035
$a
14000578
040
$a
DLC
$b
eng
$c
DLC
$e
rda
$d
DLC
041
0
$a
eng
042
$a
pcc
050
0 0
$a
TK5105.8865
$b
.G73 2014
082
0 0
$a
658.4/78
$2
23
100
1
$a
Grant, Nicholas,
$d
1978-
$3
1027163
245
1 0
$a
Unified communications forensics
$h
[electronic resource] :
$b
anatomy of common UC attacks /
$c
Nicholas Grant & Joseph Shaw II ; technical editor, Jamey B. Tubbs, CISSP, ENCE, SCERS, CEH.
260
$a
Amsterdam :
$b
Syngress is an imprint of Elsevier,
$c
2014.
300
$a
xvii, 149 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
8
$a
Machine generated contents note: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can
520
$a
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--
$c
Provided by publisher.
650
0
$a
Internet telephony.
$3
567455
650
0
$a
Computer network protocols.
$3
563359
650
0
$a
Forensic sciences.
$3
563977
700
1
$a
Shaw, Joseph,
$c
II,
$d
1976-
$3
1027164
856
4 0
$u
http://www.sciencedirect.com/science/book/9781597499927
$z
click for full text (2015 TAEBDC PDA eBooks Trial, Trial Period: 2015.6.3-2015.12.31)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入