語系:
繁體中文
English
說明(常見問題)
回圖書館
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Asterisk hacking
~
Brashars, Joshua.
Asterisk hacking
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
Asterisk hacking/
其他作者:
Brashars, Joshua.
出版者:
[S.l.] :Syngress, : 2007.,
面頁冊數:
1 v.
標題:
Internet telephony - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9781597491518
Asterisk hacking
Asterisk hacking
[electronic resource]. - [S.l.] :Syngress,2007. - 1 v.
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9781597491518
Source: 140744:140882Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
290983
Internet telephony
--Security measures.Index Terms--Genre/Form:
96803
Electronic books.
LC Class. No.: TK5105.8865 / .A88 2007eb
Dewey Class. No.: 006.5
Asterisk hacking
LDR
:02634cmm 2200313Ia 4500
001
153005
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
160218s2007 xx o 000 0 eng d
020
$a
9781597491518
020
$a
1597491519
029
1
$a
NZ1
$b
11778671
035
$a
(OCoLC)166351802
035
$a
ocn166351802
037
$a
140744:140882
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.8865
$b
.A88 2007eb
082
0 4
$a
006.5
$2
22
245
0 0
$a
Asterisk hacking
$h
[electronic resource].
260
$a
[S.l.] :
$c
2007.
$b
Syngress,
300
$a
1 v.
505
0
$a
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
520
$a
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 15, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Internet telephony
$x
Security measures.
$3
290983
650
0
$a
Computer networks
$x
Security measures.
$3
86541
655
7
$a
Electronic books.
$2
local.
$3
96803
700
1
$a
Brashars, Joshua.
$3
290982
710
2
$a
ScienceDirect (Online service)
$3
254709
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入