Record ID | marc_nuls/NULS_PHC_180925.mrc:143969838:1874 |
Source | marc_nuls |
Download Link | /show-records/marc_nuls/NULS_PHC_180925.mrc:143969838:1874?format=raw |
LEADER: 01874cam 2200373 a 4500
001 9920975690001661
005 20150423132545.0
008 070430s2008 njua b 001 0 eng
010 $a 2007017689
020 $a0321437349 (pbk. : alk. paper)
020 $a9780321437341 (pbk. : alk. paper)
035 $a(CSdNU)u308232-01national_inst
035 $a(OCoLC)123955114
035 $a(OCoLC)123955114
035 $a(OCoLC)123955114
040 $aDLC$cDLC$dBAKER$dBTCTA$dC#P$dYDXCP$dOrLoB-B
049 $aCNUM
050 00 $aTK5105.8865$b.T44 2008
082 00 $a004.695$222
100 1 $aThermos, Peter.
245 10 $aSecuring VoIP networks :$bthreats, vulnerabilities, and countermeasures /$cPeter Thermos and Ari Takanen.
260 $aUpper Saddle River, NJ :$bAddison-Wesley,$cc2008.
300 $axxiii, 359 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 0 $aCh. 1. Introduction -- Ch. 2. VoIP architectures and protocols -- Ch. 3. Threats and attacks -- Ch. 4. VoIP vulnerabilities -- Ch. 5. Signaling protection mechanisms -- Ch. 6. Media protection mechanisms -- Ch. 7. Key management mechanisms -- Ch. 8. VoIP and network security controls -- Ch. 9. A security framework for enterprise VoIP networks -- Ch. 10. Provider architectures and security -- Ch. 11. Enterprise architectures and security.
650 0 $aInternet telephony$xSecurity measures.
700 1 $aTakanen, Ari.
938 $aBaker & Taylor$bBKTY$c44.99$d44.99$i0321437349$n0007186111$sactive
938 $aBaker and Taylor$bBTCP$n2007017689
938 $aYBP Library Services$bYANK$n2579448
947 $fSOET-EGR$hCIRCSTACKS$p$42.74$q1
949 $aTK 5105.8865 .T44 2008$i31786102207039
994 $a92$bCNU
999 $aTK 5105.8865 .T44 2008$wLC$c1$i31786102207039$d4/14/2009$e3/20/2009 $lCIRCSTACKS$mNULS$n1$rY$sY$tBOOK$u10/18/2007