Voice and data security / Gregory B. White ... [and others].
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 0672321505 (pbk)
- QA76.9.A25 V65 2001
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 V65 2001 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000249492 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 V65 2001 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000249772 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 V38 2003 Managing new issues : cyber security in an era of technological change / | QA76.9.A25 V38 2003 Managing new issues : cyber security in an era of technological change / | QA76.9 A25 V65 1999 Multilingual dictionary of IT security : English, German, French, Spanish, Italian / | QA76.9.A25 V65 2001 Voice and data security / | QA76.9.A25 V65 2001 Voice and data security / | QA76.9.A25 V66 2009 Information security governance / | QA76.9.A25 W39 1997 Digital copyright protection / |
Includes bibliographical references (pages 458-460) and index.
Pt. I. Background. 1. Understanding the Risks. 2. Understanding Security Basics. 3. Understanding Networks and TCP/IP. 4. Understanding Net-based Attacks. 5. Understanding the Move Toward Convergence Technology. 6. Understanding Total Network Connectivity. 7. Understanding Telco Basics. 8. Understanding Voice Over Network (VON) Protocols -- Pt. II. Securing Your Data Network from Telco-based Attacks. 9. War Dialers and Telephone Line Scanners. 10. Telecommunication Firewalls -- Pt. III. Securing Your Voice Assets. 11. Susceptibility to Tapping. 12. PBX Vulnerabilities. 13. Wireless Security, Voice, and Data. 14. Understanding and Securing Voice Mail Systems -- Pt. IV. Securing Voice over Networks and Multimedia Services. 15. Quality of Service and Implementation Issues. 16. VON Security. 17. Multimedia Protocols and Security -- Pt. V. Data Network Security Issues. 18. Cryptography. 19. Viruses, Worms, and Other Malicious Software.
20. Sniffing, Spoofing, and Man-in-the-Middle Attacks. 21. Network Scanning. 22. Password Management and Auditing. 23. Firewalls. 24. Monitoring, Logs, and Intrusion Detection Systems. 25. Broadband Net Access and Security. 26. Distributed Denial of Service Attack Survivability. 27. Web (In)Security. 28. Security and the Law.