Hacking exposed unified communications & VoIP security secrets & solutions
Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to...
Saved in:
| Main Authors: | Collier, Mark D. (Author), Endler, David (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York, NY
McGraw-Hill Education
2014
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999)
by: McClure
Published: (1999)
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012)
by: McClure, Stuart, et al.
Published: (2012)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)
by: Scambray, Joel
Published: (2011)
Hacking exposed 6 network security secrets and solutions
by: McClure, Stuart
Published: (2009)
by: McClure, Stuart
Published: (2009)
Internet security you can afford using Untangle as your internet gateway
by: Dawson, Christopher
Published: (2015)
by: Dawson, Christopher
Published: (2015)
Building internet firewalls
by: ZwickylhElizabeth D.
by: ZwickylhElizabeth D.
Hacking exposed wireless wireless security secrets & solutions /
by: Cache, Johnny
Published: (2007)
by: Cache, Johnny
Published: (2007)
Hacking exposed wireless wireless security secrets & solutions
by: Cache, Johnny
Published: (2010)
by: Cache, Johnny
Published: (2010)
Network forensics
by: Messier, Ric
Published: (2017)
by: Messier, Ric
Published: (2017)
Hacking exposed wireless wireless security secrets & solutions
by: Wright, Joshua, et al.
Published: (2015)
by: Wright, Joshua, et al.
Published: (2015)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Security and privacy issues in sensor networks and IoT
Published: (2020)
Published: (2020)
VoIP wireless, P2P and new enterprise voice over IP
by: Ganguly, Samrat
Published: (2008)
by: Ganguly, Samrat
Published: (2008)
Internet and intranet security
by: OppligerlhRolf
by: OppligerlhRolf
IPSec The new security standard for the internet, intranets, and virtual private networks
by: DorasmawylhNaganand
by: DorasmawylhNaganand
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Fire the phone company a handy guide to voice over IP
by: Field
Published: (2006)
by: Field
Published: (2006)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
Unified communications forensics anatomy of common UC attacks
by: Grant, Nicholas, 1978-, et al.
Published: (2013)
by: Grant, Nicholas, 1978-, et al.
Published: (2013)
Protect your privacy on the Internet Privacy defense tools and techniques you can use right now
by: Pfaffenberger
Published: (1997)
by: Pfaffenberger
Published: (1997)
Learn ethical hacking from scratch your stepping stone to penetration testing
by: Sabih, Zaid
Published: (2018)
by: Sabih, Zaid
Published: (2018)
Network security in the 90's issues and solutions for managers
by: Madron, Thomas William 1937-
Published: (1992)
by: Madron, Thomas William 1937-
Published: (1992)
Practical Industrial Internet of Things security practitioner's guide to securing connected industries
by: Bhattacharjee, Sravani
Published: (2018)
by: Bhattacharjee, Sravani
Published: (2018)
Cyber security threat an emerging challenge to global security
by: Lua, Pei Ting
Published: (2019)
by: Lua, Pei Ting
Published: (2019)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Applied network security master the art of detecting and averting advanced network security attacks and techniques
by: Salmon, Arthur, et al.
Published: (2017)
by: Salmon, Arthur, et al.
Published: (2017)
Network security architectures
by: Convery, Sean
Published: (2012)
by: Convery, Sean
Published: (2012)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2022)
by: Whitman, Michael E., et al.
Published: (2022)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2016)
by: Whitman, Michael E., et al.
Published: (2016)
Information security and IT risk management
by: Agrawal, Manish
Published: (2014)
by: Agrawal, Manish
Published: (2014)
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Network and internetwork security principles and practice
by: Stallings, William
Published: (1995)
by: Stallings, William
Published: (1995)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Similar Items
-
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999) -
Hacking exposed network security secrets and solutions
by: McClure
Published: (1999) -
Hacking exposed 7 network security secrets & solutions
by: McClure, Stuart, et al.
Published: (2012) -
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013) -
Hacking exposed web applications : web application security secrets and solutions
by: Scambray, Joel
Published: (2011)


