LEADER 00000cam a2200565 i 4500 001 870459867 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 140213s2014 nyua ob 001 0 eng d 019 1312327388 020 9780071798778|q(electronic book) 020 0071798773|q(electronic book) 029 1 AU@|b000053305542 029 1 DEBSZ|b40433704X 035 (OCoLC)870459867|z(OCoLC)1312327388 037 CL0500000385|bSafari Books Online 040 UMI|beng|erda|epn|cUMI|dB24X7|dS4S|dCOO|dOCLCO|dDEBBG |dDEBSZ|dYDXCP|dOCLCQ|dOCLCF|dTOH|dOCLCO|dYDX|dN$T|dOCLCQ |dKSU|dOCLCQ|dOCLCO 049 INap 082 04 005.8 082 04 005.8|223/eng/20220422 099 eBook O'Reilly for Public Libraries 100 1 Collier, Mark D.,|eauthor. 245 10 Hacking exposed :|bunified communications & VoIP security secrets & solutions /|cMark Collier, David Endler. |h[O'Reilly electronic resource] 250 2nd ed. 264 1 New York :|bMcGraw-Hill Education,|c©2014. 300 1 online resource (1 volume) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 1 The secure beginner's guides: security smarts for the self -guided IT professional 504 Includes bibliographical references and index. 505 8 Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS - - 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service - - 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation. 520 "Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in -the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"--|cProvided by publisher 588 0 Online resource; title from PDF title page (viewed April 22, 2022). 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Internet telephony|xSecurity measures. 650 0 Computer networks|xSecurity measures. 650 6 Téléphonie Internet|xSécurité|xMesures. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures. 650 7 Computer networks|xSecurity measures|2fast 700 1 Endler, David. 776 08 |iPrint version:|aCollier, Mark D.|tHacking exposed. |bSecond edition.|dNew York : McGraw-Hill Education, [2014]|z9780071798761|w(DLC) 2013044616|w(OCoLC)864709612 830 0 Secure beginner's guides. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780071798761/?ar |zAvailable on O'Reilly for Public Libraries 938 Books 24x7|bB247|nbks00059135 938 EBSCOhost|bEBSC|n2688282 938 YBP Library Services|bYANK|n12087467 994 92|bJFN