Asterisk Hacking. Toolkit and Live Cd
Benjamin Jackson, Champ Clark III, Larry Chaffin and Johnny Long (Auth.)
Content:
Co-Authors, Page v
Technical Editors, Page vi
Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
Chapter 2 - Setting Up Asterisk, Pages 21-64
Chapter 3 - Configuring Asterisk, Pages 65-114
Chapter 4 - Writing Applications with Asterisk, Pages 115-145
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
Index, Pages 245-253
Co-Authors, Page v
Technical Editors, Page vi
Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
Chapter 2 - Setting Up Asterisk, Pages 21-64
Chapter 3 - Configuring Asterisk, Pages 65-114
Chapter 4 - Writing Applications with Asterisk, Pages 115-145
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
Index, Pages 245-253
Kategori:
Tahun:
2007
Penerbit:
Syngress
Bahasa:
english
Halaman:
253
ISBN 10:
1597491519
ISBN 13:
9781597491518
File:
PDF, 4.98 MB
IPFS:
,
english, 2007