Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Asterisk hacking
~
ScienceDirect (Online service)
Linked to FindBook
Google Book
Amazon
博客來
Asterisk hacking
Record Type:
Language materials, printed : Monograph/item
Title/Author:
Asterisk hacking/
other author:
Brashars, Joshua.
Published:
[S.l.] :Syngress, : 2007.,
Description:
1 v.
[NT 15003449]:
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
Subject:
Computer networks - Security measures. -
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491518An electronic book accessible through the World Wide Web; click for information
Online resource:
http://www.sciencedirect.com/science/book/9781597491518An electronic book accessible through the World Wide Web; click for information
ISBN:
1597491519
Asterisk hacking
Asterisk hacking
[electronic resource]. - [S.l.] :Syngress,2007. - 1 v.
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 1597491519
Source: 140744:140882Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.8865 / .A88 2007eb
Dewey Class. No.: 006.5
Asterisk hacking
LDR
:02618cam 2200313 a 45
001
892809
003
OCoLC
005
20101126
006
m d
007
cr cn|||||||||
008
101126s2007 xx o 000 0 eng d
020
$a
1597491519
020
$a
9781597491518
029
1
$a
NZ1
$b
11778671
035
$a
(OCoLC)166351802
035
$a
ocn166351802
037
$a
140744:140882
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.8865
$b
.A88 2007eb
082
0 4
$a
006.5
$2
22
245
0 0
$a
Asterisk hacking
$h
[electronic resource].
260
$a
[S.l.] :
$c
2007.
$b
Syngress,
300
$a
1 v.
505
0
$a
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
520
$a
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 15, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Internet telephony
$x
Security measures.
$3
767815
655
7
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Brashars, Joshua.
$3
913636
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9084890
電子資源
11.線上閱覽_V
電子書
EB W9084890
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login