Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200565 i 4500 
001    870459867 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    140213s2014    nyua    ob    001 0 eng d 
019    1312327388 
020    9780071798778|q(electronic book) 
020    0071798773|q(electronic book) 
029 1  AU@|b000053305542 
029 1  DEBSZ|b40433704X 
035    (OCoLC)870459867|z(OCoLC)1312327388 
037    CL0500000385|bSafari Books Online 
040    UMI|beng|erda|epn|cUMI|dB24X7|dS4S|dCOO|dOCLCO|dDEBBG
       |dDEBSZ|dYDXCP|dOCLCQ|dOCLCF|dTOH|dOCLCO|dYDX|dN$T|dOCLCQ
       |dKSU|dOCLCQ|dOCLCO 
049    INap 
082 04 005.8 
082 04 005.8|223/eng/20220422 
099    eBook O'Reilly for Public Libraries 
100 1  Collier, Mark D.,|eauthor. 
245 10 Hacking exposed :|bunified communications & VoIP security 
       secrets & solutions /|cMark Collier, David Endler.
       |h[O'Reilly electronic resource] 
250    2nd ed. 
264  1 New York :|bMcGraw-Hill Education,|c©2014. 
300    1 online resource (1 volume) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  The secure beginner's guides: security smarts for the self
       -guided IT professional 
504    Includes bibliographical references and index. 
505 8  Machine generated contents note: 1 VoIP Components & 
       Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4
       Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -
       - 6 Social Engineering & Information Harvesting -- 7 Voice
       Spam & Phishing -- 8 Infastructure Denial of Service -- 9 
       Network Eavesdropping -- 10 Interception -- 11 Cisco 
       Unified Cisco Call Manager -- 12 Avaya Communication 
       Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and 
       other Technologies -- 15 Fuzzing & Disrupting of Service -
       - 16 VoIP Signaling Manipulation -- 17 Audio & Video 
       Manipulation. 
520    "Establish a holistic security stance by learning to view 
       your Internet telephony infrastructure through the eyes of
       the nefarious cyber-criminal. Hacking ExposedTM Unified 
       Communications & VoIP, Second Edition offers thoroughly 
       expanded coverage of today's rampant threats alongside 
       ready-to-deploy countermeasures. Find out how to block 
       TDoS, toll and social engineering fraud, service abuse, 
       voice phishing, voice SPAM/SPIT, eavesdropping, and man-in
       -the-middle exploits. This comprehensive guide features 
       all-new chapters, case studies, and examples"--|cProvided 
       by publisher 
588 0  Online resource; title from PDF title page (viewed April 
       22, 2022). 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Internet telephony|xSecurity measures. 
650  0 Computer networks|xSecurity measures. 
650  6 Téléphonie Internet|xSécurité|xMesures. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  7 Computer networks|xSecurity measures|2fast 
700 1  Endler, David. 
776 08 |iPrint version:|aCollier, Mark D.|tHacking exposed.
       |bSecond edition.|dNew York : McGraw-Hill Education, 
       [2014]|z9780071798761|w(DLC)  2013044616|w(OCoLC)864709612
830  0 Secure beginner's guides. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780071798761/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Books 24x7|bB247|nbks00059135 
938    EBSCOhost|bEBSC|n2688282 
938    YBP Library Services|bYANK|n12087467 
994    92|bJFN