PBX security and forensics: a practical approach
<p>PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as s...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York, NY [u.a.]
Springer
2013
|
Schriftenreihe: | SpringerBriefs in electrical and computer engineering
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHN01 FHR01 FKE01 FWS01 Volltext |
Zusammenfassung: | <p>PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.</p> |
Beschreibung: | <p>Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.</p> |
Beschreibung: | 1 Online-Ressource (XX, 115 p. 85 illus) |
ISBN: | 9781461416562 |
DOI: | 10.1007/978-1-4614-1656-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV040693739 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 130123s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781461416562 |c Online |9 978-1-4614-1656-2 | ||
024 | 7 | |a 10.1007/978-1-4614-1656-2 |2 doi | |
035 | |a (OCoLC)812578859 | ||
035 | |a (DE-599)BVBBV040693739 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-898 |a DE-634 |a DE-573 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-863 | ||
082 | 0 | |a 621.382 | |
100 | 1 | |a Androulidakis, Iosif I. |e Verfasser |4 aut | |
245 | 1 | 0 | |a PBX security and forensics |b a practical approach |c Iosif I. Androulidakis |
264 | 1 | |a New York, NY [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XX, 115 p. 85 illus) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in electrical and computer engineering | |
500 | |a <p>Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.</p> | ||
520 | |a <p>PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.</p> | ||
650 | 4 | |a Ingenieurwissenschaften | |
650 | 4 | |a Engineering | |
650 | 4 | |a Forensic medicine | |
650 | 4 | |a Data protection | |
650 | 4 | |a Telecommunication | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-1-4614-1655-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-1-4614-1656-2 |x Verlag |3 Volltext |
912 | |a ZDB-2-ENG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-025674409 | ||
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-1-4614-1656-2 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 923216 |
---|---|
_version_ | 1806194905540722688 |
any_adam_object | |
author | Androulidakis, Iosif I. |
author_facet | Androulidakis, Iosif I. |
author_role | aut |
author_sort | Androulidakis, Iosif I. |
author_variant | i i a ii iia |
building | Verbundindex |
bvnumber | BV040693739 |
collection | ZDB-2-ENG |
ctrlnum | (OCoLC)812578859 (DE-599)BVBBV040693739 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-1-4614-1656-2 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02669nmm a2200493zc 4500</leader><controlfield tag="001">BV040693739</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130123s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461416562</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4614-1656-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-1-4614-1656-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)812578859</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040693739</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-898</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Androulidakis, Iosif I.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">PBX security and forensics</subfield><subfield code="b">a practical approach</subfield><subfield code="c">Iosif I. Androulidakis</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 115 p. 85 illus)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in electrical and computer engineering</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a"><p>Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.</p></subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a"><p>PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.</p></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic medicine</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-1-4614-1655-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025674409</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-1-4614-1656-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV040693739 |
illustrated | Not Illustrated |
indexdate | 2024-08-01T16:14:51Z |
institution | BVB |
isbn | 9781461416562 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025674409 |
oclc_num | 812578859 |
open_access_boolean | |
owner | DE-898 DE-BY-UBR DE-634 DE-573 DE-92 DE-Aug4 DE-859 DE-863 DE-BY-FWS |
owner_facet | DE-898 DE-BY-UBR DE-634 DE-573 DE-92 DE-Aug4 DE-859 DE-863 DE-BY-FWS |
physical | 1 Online-Ressource (XX, 115 p. 85 illus) |
psigel | ZDB-2-ENG |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in electrical and computer engineering |
spellingShingle | Androulidakis, Iosif I. PBX security and forensics a practical approach Ingenieurwissenschaften Engineering Forensic medicine Data protection Telecommunication |
title | PBX security and forensics a practical approach |
title_auth | PBX security and forensics a practical approach |
title_exact_search | PBX security and forensics a practical approach |
title_full | PBX security and forensics a practical approach Iosif I. Androulidakis |
title_fullStr | PBX security and forensics a practical approach Iosif I. Androulidakis |
title_full_unstemmed | PBX security and forensics a practical approach Iosif I. Androulidakis |
title_short | PBX security and forensics |
title_sort | pbx security and forensics a practical approach |
title_sub | a practical approach |
topic | Ingenieurwissenschaften Engineering Forensic medicine Data protection Telecommunication |
topic_facet | Ingenieurwissenschaften Engineering Forensic medicine Data protection Telecommunication |
url | https://doi.org/10.1007/978-1-4614-1656-2 |
work_keys_str_mv | AT androulidakisiosifi pbxsecurityandforensicsapracticalapproach |