語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Asterisk hacking
~
ScienceDirect (Online service)
FindBook
Google Book
Amazon
博客來
Asterisk hacking
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Asterisk hacking/
其他作者:
Brashars, Joshua.
出版者:
[S.l.] :Syngress, : 2007.,
面頁冊數:
1 v.
內容註:
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
標題:
Computer networks - Security measures. -
電子資源:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491518An electronic book accessible through the World Wide Web; click for information
電子資源:
http://www.sciencedirect.com/science/book/9781597491518An electronic book accessible through the World Wide Web; click for information
ISBN:
1597491519
Asterisk hacking
Asterisk hacking
[electronic resource]. - [S.l.] :Syngress,2007. - 1 v.
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 1597491519
Source: 140744:140882Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
579161
Computer networks
--Security measures.Index Terms--Genre/Form:
542853
Electronic books.
LC Class. No.: TK5105.8865 / .A88 2007eb
Dewey Class. No.: 006.5
Asterisk hacking
LDR
:02618cam 2200313 a 45
001
892809
003
OCoLC
005
20101126
006
m d
007
cr cn|||||||||
008
101126s2007 xx o 000 0 eng d
020
$a
1597491519
020
$a
9781597491518
029
1
$a
NZ1
$b
11778671
035
$a
(OCoLC)166351802
035
$a
ocn166351802
037
$a
140744:140882
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$c
OPELS
$d
OPELS
049
$a
TEFA
050
1 4
$a
TK5105.8865
$b
.A88 2007eb
082
0 4
$a
006.5
$2
22
245
0 0
$a
Asterisk hacking
$h
[electronic resource].
260
$a
[S.l.] :
$c
2007.
$b
Syngress,
300
$a
1 v.
505
0
$a
What is Asterisk and why do you need it? -- Installing Asterisk -- Add-ons and Modules -- Scripting -- Asterisk Hardware Ninjutsu -- Protocols, say what? -- Asterisk Underground -- Lock it down! -- Reach out and touch someone: The future of Asterisk Hacking.
520
$a
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword for defense or attack! *Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot! *Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! *See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on Aug. 15, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
0
$a
Internet telephony
$x
Security measures.
$3
767815
655
7
$a
Electronic books.
$2
lcsh
$3
542853
700
1
$a
Brashars, Joshua.
$3
913636
710
2
$a
ScienceDirect (Online service)
$3
848416
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491518
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9084890
電子資源
11.線上閱覽_V
電子書
EB W9084890
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入