Wonder Club world wonders pyramid logo
×

Voice and data security Book

Voice and data security
Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. <i>Voice and Data Convergence Security</i> wil, Voice and data security has a rating of 3 stars
   2 Ratings
X
Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security wil, Voice and data security
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Voice and data security
  • Written by author Dr. Gregory White,David DiCenso,Dwayne Williams,Travis Good,Kevin Archer,Chuck Cothren,Roger Davis
  • Published by Indianapolis, Ind. : Sams, c2001., 2001/07/06
  • This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security wil
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Introduction.
Understanding the Risks.
Understanding Security Basics.
Understanding Networks and TCP/IP.
Understanding Net-Based Attacks.
Understanding the Move Towards Convergence Technology.
Securing Your Data Network from Telco- Based Attacks.
Understanding Total Network Connectivity.
Wardialers & Telephone Line Scanners.
Telephone Firewalls.
Securing Your Voice Assets.
Understanding Telco Basics.
Susceptibility to Tapping.
Maintenance Features and Vulnerabilities.
Administration of a PBX and User Features.
Wireless Security, Voice and Data.
Understanding and Securing Voice Mail Systems.
Securing Voice over Networks and Multimedia Services.
Understanding Voice Over Network (VON) Protocols.
Quality of Service and Implementation Issues.
VON Security.
Multimedia Protocols and Security.
Appendices.
Cryptography.
Viruses and Other Malicious Software.
Sniffing, Spoofing, and Man-in-the Middle Attacks.
Network Scanning.
Password Cracking.
Firewalls.
Monitoring, Logs, and Intrusion Detection Systems.
Broadband Net Access and Security.
Distributed Denial of Service Attack Survivability.
Web Security.
Security and the Law.
Resources.


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. <i>Voice and Data Convergence Security</i> wil, Voice and data security

X
WonderClub Home

This item is in your Collection

Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. <i>Voice and Data Convergence Security</i> wil, Voice and data security

Voice and data security

X
WonderClub Home

This Item is in Your Inventory

Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. <i>Voice and Data Convergence Security</i> wil, Voice and data security

Voice and data security

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: