Normal view MARC view ISBD view

PBX Security and Forensics [electronic resource] :A Practical Approach / by Iosif I. Androulidakis.

by Androulidakis, Iosif I [author.]; SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Electrical and Computer Engineering: Publisher: New York, NY : Springer New York : 2013.Description: XX, 115 p. 85 illus. online resource.ISBN: 9781461416562.Subject(s): Engineering | Forensic medicine | Data protection | Telecommunication | Engineering | Communications Engineering, Networks | Systems and Data Security | Security Science and Technology | Forensic ScienceDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.
In: Springer eBooksSummary: PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Call number Status Date due Barcode
MAIN LIBRARY
TK1-9971 (Browse shelf) Available

Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.

PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

There are no comments for this item.

Log in to your account to post a comment.
@ Jomo Kenyatta University Of Agriculture and Technology Library

Powered by Koha