001
000006550
003
LDTU
041
$aeng
082
$a005.822
100
$aEndler, David
245
$aHacking exposed VoIP $bVoice over IP security secrets & solutions $cDavid Endler, Mark Collier
260
$aNew York $bMc Graw Hill $c2007
300
$a539 p. $c25 cm
504
$a References: p.516
520
$aPart 1: Casing the establishment; Part 2: Exploiting the VoIP network; Part 3: Exploiting specific VoIP platforms; Part 4: VoIP session and application hacking; Part 5:Social threats.
650
$aNetwork security -- VoIP
653
$aVoIP
700
$aCollier, Mark
852
$a209 Phan Thanh $bTiếng Anh
911
Đinh Thị Thu Hồng
927
Mua
928
17197
Sách Chuyên ngành
- Learning Perl: making easy things easy and hard things possible : 8th ed.
- Computer networking bible 3 in 1 : the complete crash course to effectively design, implement and manage networks. Including sections on security, performance and scalability
- Digital forensics and incident response : incident response tools and techniques for effective cyber threat response : 3rd ed.
- Computer networking : a top-down approach : 8th ed.
- Security engineering : a guide to building dependable distributed systems : 3rd ed.