Asterisk hacking: toolkit and liveCD
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
c2007
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | What is Asterisk and why do you need it? -- Setting up Asterisk -- Configuring Asterisk -- Writing applications with Asterisk -- Understanding and taking advantage of VoIP protocols -- Asterisk Hardware Ninjutsu -- Threats to VoIP communications systems Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack! |
Beschreibung: | 1 Online-Ressource (xii, 253 p.) |
ISBN: | 0080554350 9780080554358 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043129345 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2007 |||| o||u| ||||||eng d | ||
020 | |a 0080554350 |c electronic bk. |9 0-08-055435-0 | ||
020 | |a 9780080554358 |c electronic bk. |9 978-0-08-055435-8 | ||
035 | |a (OCoLC)183183750 | ||
035 | |a (DE-599)BVBBV043129345 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 004.69/5 |2 22 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
100 | 1 | |a Jackson, Benjamin |e Verfasser |4 aut | |
245 | 1 | 0 | |a Asterisk hacking |b toolkit and liveCD |c Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors |
264 | 1 | |a Burlington, MA |b Syngress |c c2007 | |
300 | |a 1 Online-Ressource (xii, 253 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a What is Asterisk and why do you need it? -- Setting up Asterisk -- Configuring Asterisk -- Writing applications with Asterisk -- Understanding and taking advantage of VoIP protocols -- Asterisk Hardware Ninjutsu -- Threats to VoIP communications systems | ||
500 | |a Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack! | ||
650 | 7 | |a COMPUTERS / System Administration / Email Administration |2 bisacsh | |
650 | 7 | |a Internet telephony |2 fast | |
650 | 4 | |a Internet telephony | |
650 | 0 | 7 | |a Asterisk |g Software |0 (DE-588)7523933-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Asterisk |g Software |0 (DE-588)7523933-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Clark, Champ |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-59749-151-9 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-59749-151-8 |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028553536 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175567093760000 |
---|---|
any_adam_object | |
author | Jackson, Benjamin |
author_facet | Jackson, Benjamin |
author_role | aut |
author_sort | Jackson, Benjamin |
author_variant | b j bj |
building | Verbundindex |
bvnumber | BV043129345 |
classification_rvk | ST 205 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)183183750 (DE-599)BVBBV043129345 |
dewey-full | 004.69/5 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.69/5 |
dewey-search | 004.69/5 |
dewey-sort | 14.69 15 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02844nmm a2200481zc 4500</leader><controlfield tag="001">BV043129345</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080554350</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055435-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080554358</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055435-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183183750</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043129345</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.69/5</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jackson, Benjamin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Asterisk hacking</subfield><subfield code="b">toolkit and liveCD</subfield><subfield code="c">Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">c2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 253 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">What is Asterisk and why do you need it? -- Setting up Asterisk -- Configuring Asterisk -- Writing applications with Asterisk -- Understanding and taking advantage of VoIP protocols -- Asterisk Hardware Ninjutsu -- Threats to VoIP communications systems</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack!</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / System Administration / Email Administration</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet telephony</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet telephony</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Asterisk</subfield><subfield code="g">Software</subfield><subfield code="0">(DE-588)7523933-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Asterisk</subfield><subfield code="g">Software</subfield><subfield code="0">(DE-588)7523933-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Clark, Champ</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-59749-151-9</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-59749-151-8</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028553536</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043129345 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:20Z |
institution | BVB |
isbn | 0080554350 9780080554358 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028553536 |
oclc_num | 183183750 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xii, 253 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress |
record_format | marc |
spelling | Jackson, Benjamin Verfasser aut Asterisk hacking toolkit and liveCD Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors Burlington, MA Syngress c2007 1 Online-Ressource (xii, 253 p.) txt rdacontent c rdamedia cr rdacarrier What is Asterisk and why do you need it? -- Setting up Asterisk -- Configuring Asterisk -- Writing applications with Asterisk -- Understanding and taking advantage of VoIP protocols -- Asterisk Hardware Ninjutsu -- Threats to VoIP communications systems Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack! COMPUTERS / System Administration / Email Administration bisacsh Internet telephony fast Internet telephony Asterisk Software (DE-588)7523933-4 gnd rswk-swf Asterisk Software (DE-588)7523933-4 s 1\p DE-604 Clark, Champ Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 1-59749-151-9 Erscheint auch als Druck-Ausgabe, Paperback 978-1-59749-151-8 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Jackson, Benjamin Asterisk hacking toolkit and liveCD COMPUTERS / System Administration / Email Administration bisacsh Internet telephony fast Internet telephony Asterisk Software (DE-588)7523933-4 gnd |
subject_GND | (DE-588)7523933-4 |
title | Asterisk hacking toolkit and liveCD |
title_auth | Asterisk hacking toolkit and liveCD |
title_exact_search | Asterisk hacking toolkit and liveCD |
title_full | Asterisk hacking toolkit and liveCD Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors |
title_fullStr | Asterisk hacking toolkit and liveCD Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors |
title_full_unstemmed | Asterisk hacking toolkit and liveCD Benjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors |
title_short | Asterisk hacking |
title_sort | asterisk hacking toolkit and livecd |
title_sub | toolkit and liveCD |
topic | COMPUTERS / System Administration / Email Administration bisacsh Internet telephony fast Internet telephony Asterisk Software (DE-588)7523933-4 gnd |
topic_facet | COMPUTERS / System Administration / Email Administration Internet telephony Asterisk Software |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211557 |
work_keys_str_mv | AT jacksonbenjamin asteriskhackingtoolkitandlivecd AT clarkchamp asteriskhackingtoolkitandlivecd |