How to cheat at VoIP security /:
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. :
Syngress,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! |
Beschreibung: | 1 online resource (xx, 412 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080553535 0080553532 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn298780513 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr zn||||||||| | ||
008 | 081202s2007 maua ob 001 0 eng d | ||
040 | |a CtWfDGI |b eng |e pn |c COCUF |d N$T |d YDXCP |d ZCU |d IDEBK |d E7B |d OCLCQ |d B24X7 |d MERUC |d OCLCQ |d OCLCO |d OCLCQ |d OPELS |d DKDLA |d OCLCQ |d COO |d OCLCQ |d AGLDB |d LIV |d OCLCQ |d OCLCF |d JBG |d D6H |d UAB |d OCLCQ |d VTS |d UKMGB |d WYU |d STF |d LEAUB |d M8D |d VT2 |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
015 | |a GBB6H2038 |2 bnb | ||
016 | 7 | |a 017548962 |2 Uk | |
019 | |a 162131593 |a 182732370 |a 183273687 |a 488132285 |a 507230094 |a 647685167 |a 856956991 |a 1065875497 |a 1103281844 |a 1129330817 |a 1153032619 |a 1192339633 |a 1240524965 | ||
020 | |a 9780080553535 |q (electronic bk.) | ||
020 | |a 0080553532 |q (electronic bk.) | ||
020 | |z 9781597491693 | ||
020 | |z 1597491691 | ||
035 | |a (OCoLC)298780513 |z (OCoLC)162131593 |z (OCoLC)182732370 |z (OCoLC)183273687 |z (OCoLC)488132285 |z (OCoLC)507230094 |z (OCoLC)647685167 |z (OCoLC)856956991 |z (OCoLC)1065875497 |z (OCoLC)1103281844 |z (OCoLC)1129330817 |z (OCoLC)1153032619 |z (OCoLC)1192339633 |z (OCoLC)1240524965 | ||
037 | |a 140935:141077 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.8865 |b .P67 2007eb | |
072 | 7 | |a COM |x 020020 |2 bisacsh | |
082 | 7 | |a 004.69 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Porter, Thomas, |c PhD. |1 https://id.oclc.org/worldcat/entity/E39PCjFXbXrVby94vW6qhGFk6q |0 http://id.loc.gov/authorities/names/no2006056416 | |
245 | 1 | 0 | |a How to cheat at VoIP security / |c Thomas Porter, Michael Gough. |
260 | |a Rockland, Mass. : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (xx, 412 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. | |
520 | |a Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! | ||
650 | 0 | |a Internet telephony |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Téléphonie Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x System Administration |x Email Administration. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
700 | 1 | |a Gough, Michael, |d 1963- |4 aut |1 https://id.oclc.org/worldcat/entity/E39PCjHg86PYptF8mwMWcpQd6X |0 http://id.loc.gov/authorities/names/no2008059022 | |
758 | |i has work: |a How to cheat at Voip security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFV7tCkqFXHM7Jfhftb7xP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Porter, Thomas, PhD. |t How to cheat at VoIP security. |d Rockland, MA : Syngress, ©2007 |z 9781597491693 |z 1597491691 |w (DLC) 2007298838 |w (OCoLC)144227884 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211410 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597491693 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a Books 24x7 |b B247 |n bks00025450 | ||
938 | |a EBSCOhost |b EBSC |n 211410 | ||
938 | |a YBP Library Services |b YANK |n 2737755 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn298780513 |
---|---|
_version_ | 1816881684488912896 |
adam_text | |
any_adam_object | |
author | Porter, Thomas, PhD Gough, Michael, 1963- |
author_GND | http://id.loc.gov/authorities/names/no2006056416 http://id.loc.gov/authorities/names/no2008059022 |
author_facet | Porter, Thomas, PhD Gough, Michael, 1963- |
author_role | aut |
author_sort | Porter, Thomas, PhD |
author_variant | t p tp m g mg |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8865 .P67 2007eb |
callnumber-search | TK5105.8865 .P67 2007eb |
callnumber-sort | TK 45105.8865 P67 42007EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. |
ctrlnum | (OCoLC)298780513 |
dewey-full | 004.69 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.69 |
dewey-search | 004.69 |
dewey-sort | 14.69 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03908cam a2200577 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn298780513</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr zn|||||||||</controlfield><controlfield tag="008">081202s2007 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CtWfDGI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COCUF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">ZCU</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">B24X7</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">DKDLA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">JBG</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">UKMGB</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H2038</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">017548962</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">162131593</subfield><subfield code="a">182732370</subfield><subfield code="a">183273687</subfield><subfield code="a">488132285</subfield><subfield code="a">507230094</subfield><subfield code="a">647685167</subfield><subfield code="a">856956991</subfield><subfield code="a">1065875497</subfield><subfield code="a">1103281844</subfield><subfield code="a">1129330817</subfield><subfield code="a">1153032619</subfield><subfield code="a">1192339633</subfield><subfield code="a">1240524965</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080553535</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080553532</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597491693</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597491691</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)298780513</subfield><subfield code="z">(OCoLC)162131593</subfield><subfield code="z">(OCoLC)182732370</subfield><subfield code="z">(OCoLC)183273687</subfield><subfield code="z">(OCoLC)488132285</subfield><subfield code="z">(OCoLC)507230094</subfield><subfield code="z">(OCoLC)647685167</subfield><subfield code="z">(OCoLC)856956991</subfield><subfield code="z">(OCoLC)1065875497</subfield><subfield code="z">(OCoLC)1103281844</subfield><subfield code="z">(OCoLC)1129330817</subfield><subfield code="z">(OCoLC)1153032619</subfield><subfield code="z">(OCoLC)1192339633</subfield><subfield code="z">(OCoLC)1240524965</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">140935:141077</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8865</subfield><subfield code="b">.P67 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">020020</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.69</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Porter, Thomas,</subfield><subfield code="c">PhD.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFXbXrVby94vW6qhGFk6q</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006056416</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">How to cheat at VoIP security /</subfield><subfield code="c">Thomas Porter, Michael Gough.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, Mass. :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xx, 412 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">System Administration</subfield><subfield code="x">Email Administration.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gough, Michael,</subfield><subfield code="d">1963-</subfield><subfield code="4">aut</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHg86PYptF8mwMWcpQd6X</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008059022</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">How to cheat at Voip security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFV7tCkqFXHM7Jfhftb7xP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Porter, Thomas, PhD.</subfield><subfield code="t">How to cheat at VoIP security.</subfield><subfield code="d">Rockland, MA : Syngress, ©2007</subfield><subfield code="z">9781597491693</subfield><subfield code="z">1597491691</subfield><subfield code="w">(DLC) 2007298838</subfield><subfield code="w">(OCoLC)144227884</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211410</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597491693</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00025450</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">211410</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2737755</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn298780513 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:38Z |
institution | BVB |
isbn | 9780080553535 0080553532 |
language | English |
oclc_num | 298780513 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xx, 412 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | Porter, Thomas, PhD. https://id.oclc.org/worldcat/entity/E39PCjFXbXrVby94vW6qhGFk6q http://id.loc.gov/authorities/names/no2006056416 How to cheat at VoIP security / Thomas Porter, Michael Gough. Rockland, Mass. : Syngress, ©2007. 1 online resource (xx, 412 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! Internet telephony Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Téléphonie Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS System Administration Email Administration. bisacsh Computer networks Security measures fast Gough, Michael, 1963- aut https://id.oclc.org/worldcat/entity/E39PCjHg86PYptF8mwMWcpQd6X http://id.loc.gov/authorities/names/no2008059022 has work: How to cheat at Voip security (Text) https://id.oclc.org/worldcat/entity/E39PCFV7tCkqFXHM7Jfhftb7xP https://id.oclc.org/worldcat/ontology/hasWork Print version: Porter, Thomas, PhD. How to cheat at VoIP security. Rockland, MA : Syngress, ©2007 9781597491693 1597491691 (DLC) 2007298838 (OCoLC)144227884 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211410 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597491693 Volltext |
spellingShingle | Porter, Thomas, PhD Gough, Michael, 1963- How to cheat at VoIP security / Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. Internet telephony Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Téléphonie Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS System Administration Email Administration. bisacsh Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | How to cheat at VoIP security / |
title_auth | How to cheat at VoIP security / |
title_exact_search | How to cheat at VoIP security / |
title_full | How to cheat at VoIP security / Thomas Porter, Michael Gough. |
title_fullStr | How to cheat at VoIP security / Thomas Porter, Michael Gough. |
title_full_unstemmed | How to cheat at VoIP security / Thomas Porter, Michael Gough. |
title_short | How to cheat at VoIP security / |
title_sort | how to cheat at voip security |
topic | Internet telephony Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Téléphonie Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS System Administration Email Administration. bisacsh Computer networks Security measures fast |
topic_facet | Internet telephony Security measures. Computer networks Security measures. Téléphonie Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS System Administration Email Administration. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211410 https://www.sciencedirect.com/science/book/9781597491693 |
work_keys_str_mv | AT porterthomas howtocheatatvoipsecurity AT goughmichael howtocheatatvoipsecurity |