001
000006550
003
LDTU
041
$aeng
082
$a005.822
100
$aEndler, David
245
$aHacking exposed VoIP $bVoice over IP security secrets & solutions $cDavid Endler, Mark Collier
260
$aNew York $bMc Graw Hill $c2007
300
$a539 p. $c25 cm
504
$a References: p.516
520
$aPart 1: Casing the establishment; Part 2: Exploiting the VoIP network; Part 3: Exploiting specific VoIP platforms; Part 4: VoIP session and application hacking; Part 5:Social threats.
650
$aNetwork security -- VoIP
653
$aVoIP
700
$aCollier, Mark
852
$a209 Phan Thanh $bTiếng Anh
911
Đinh Thị Thu Hồng
927
Mua
928
17197
Sách Chuyên ngành
- The ethical algorithm : the science of socially aware algorithm design
- Storytelling with data : a data visualization guide for business professionals
- Our final invention : artificial intelligence and the end of the human era
- AI business strategies : leveraging artificial intelligence as a competitive advantage
- Machine learning in the aws cloud : add intelligence to applications with amazon sagemaker and amazon rekognition