عرض عادي

Voice and data security / Gregory B. White ... [and others].

المساهم (المساهمين):نوع المادة : نصنصالناشر:Indianapolis, Ind. : Sams, [2001]تاريخ حقوق النشر: copyright 2001وصف:xv, 484 pages : illustrations ; 23 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 0672321505 (pbk)
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 V65 2001
المحتويات:
Pt. I. Background. 1. Understanding the Risks. 2. Understanding Security Basics. 3. Understanding Networks and TCP/IP. 4. Understanding Net-based Attacks. 5. Understanding the Move Toward Convergence Technology. 6. Understanding Total Network Connectivity. 7. Understanding Telco Basics. 8. Understanding Voice Over Network (VON) Protocols -- Pt. II. Securing Your Data Network from Telco-based Attacks. 9. War Dialers and Telephone Line Scanners. 10. Telecommunication Firewalls -- Pt. III. Securing Your Voice Assets. 11. Susceptibility to Tapping. 12. PBX Vulnerabilities. 13. Wireless Security, Voice, and Data. 14. Understanding and Securing Voice Mail Systems -- Pt. IV. Securing Voice over Networks and Multimedia Services. 15. Quality of Service and Implementation Issues. 16. VON Security. 17. Multimedia Protocols and Security -- Pt. V. Data Network Security Issues. 18. Cryptography. 19. Viruses, Worms, and Other Malicious Software.
20. Sniffing, Spoofing, and Man-in-the-Middle Attacks. 21. Network Scanning. 22. Password Management and Auditing. 23. Firewalls. 24. Monitoring, Logs, and Intrusion Detection Systems. 25. Broadband Net Access and Security. 26. Distributed Denial of Service Attack Survivability. 27. Web (In)Security. 28. Security and the Law.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 V65 2001 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010000249492
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 V65 2001 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010000249772

Includes bibliographical references (pages 458-460) and index.

Pt. I. Background. 1. Understanding the Risks. 2. Understanding Security Basics. 3. Understanding Networks and TCP/IP. 4. Understanding Net-based Attacks. 5. Understanding the Move Toward Convergence Technology. 6. Understanding Total Network Connectivity. 7. Understanding Telco Basics. 8. Understanding Voice Over Network (VON) Protocols -- Pt. II. Securing Your Data Network from Telco-based Attacks. 9. War Dialers and Telephone Line Scanners. 10. Telecommunication Firewalls -- Pt. III. Securing Your Voice Assets. 11. Susceptibility to Tapping. 12. PBX Vulnerabilities. 13. Wireless Security, Voice, and Data. 14. Understanding and Securing Voice Mail Systems -- Pt. IV. Securing Voice over Networks and Multimedia Services. 15. Quality of Service and Implementation Issues. 16. VON Security. 17. Multimedia Protocols and Security -- Pt. V. Data Network Security Issues. 18. Cryptography. 19. Viruses, Worms, and Other Malicious Software.

20. Sniffing, Spoofing, and Man-in-the-Middle Attacks. 21. Network Scanning. 22. Password Management and Auditing. 23. Firewalls. 24. Monitoring, Logs, and Intrusion Detection Systems. 25. Broadband Net Access and Security. 26. Distributed Denial of Service Attack Survivability. 27. Web (In)Security. 28. Security and the Law.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة