Related Books
Language: en
Pages: 576
Pages: 576
Type: BOOK - Published: 2007 - Publisher: McGraw Hill Professional
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
Language: en
Pages: 560
Pages: 560
Type: BOOK - Published: 2013-12-20 - Publisher: McGraw Hill Professional
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
Language: en
Pages: 421
Pages: 421
Type: BOOK - Published: 2009-03-26 - Publisher: Springer Science & Business Media
This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, Chin
Language: en
Pages: 0
Pages: 0
Type: BOOK - Published: 2014 - Publisher:
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking Expos
Language: en
Pages: 681
Pages: 681
Type: BOOK - Published: 2013 - Publisher: WIT Press
Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or l