Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer networks 40
- Examinations 24
- Security measures 23
- Certification 22
- Electronic data processing personnel 18
- Computer security 12
- Engineering & Applied Sciences 12
- Electrical & Computer Engineering 10
- Telecommunications 10
- Cisco Systems, Inc 8
- Operating systems (Computers) 8
- Linux 7
- Penetration testing (Computer security) 6
- Computer programs 5
- Computing Technology Industry Association 5
- Telecommunications engineers 5
- Business enterprises 4
- Computer technicians 4
- Hackers 4
- Kali Linux 4
- Management 4
- Apache (Computer file : Apache Group) 3
- Cloud computing 3
- Computer Science 3
- Internet telephony 3
- Open source software 3
- Python (Computer program language) 3
- TCP/IP (Computer network protocol) 3
- UNIX (Computer file) 3
- Web servers 3
-
1por Dwivedi, HimanshuTabla de Contenidos: “…Acknowledgments; Introduction; Book Overview; Lab Setup; SIP/IAX/H.323 Server; SIP Setup; H.323 Setup (Ekiga); IAX Setup; 1: An Introduction to VoIP Security; Why VoIP; VoIP Basics; How It Works; Protocols; Deployments; VoIP Security Basics; Authentication; Authorization; Availability; Encryption; Attack Vectors; Summary; PART I: VoIP Protocols; 2: Signaling: SIP Security; SIP Basics; SIP Messages; Making a VoIP Call with SIP Methods; Registration; The INVITE Request; Enumeration and Registration; Enumerating SIP Devices on a Network; Registering with Identified SIP Devices; Authentication…”
Publicado 2008
Libro electrónico -
2por Edwards, James, 1962-Tabla de Contenidos: “…Networking Self-Teaching Guide: OSI, TCP/IP, LANs, MANs, WANs, Implementation, Management, and Maintenance; About the Authors; Credits; Acknowledgments; Contents; Introduction; Part I: Networking Nuts and Bolts; Chapter 1: Introduction to Networking; 1.1 Networking: A Brief Introduction; 1.2 History of Networking; 1.3 Standards and Standards Organizations; 1.4 An Introduction to the OSI Reference Model; 1.5 TCP/IP, Please (and Don't Be Stingy with the IP); 1.6 Chapter Exercises; 1.7 Pop Quiz Answers; Chapter 2: LANs, MANs, and WANs; 2.1 Local Area Networks; 2.2 Metropolitan Area Networks…”
Publicado 2009
Biblioteca Universitat Ramon Llull (Otras Fuentes: Universidad Loyola - Universidad Loyola Granada, Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico -
3Publicado 2006“…VoIP ist die Abkürzung für Voice over Internet Protocol. …”
Libro electrónico -
4
-
5por Dang, Luan“…While many books describe the theory behind Voice over IP, only Practical VoIP Using VOCAL describes how such a phone system was actually built, and how you too can acquire the source code, install it onto a system, connect phones, and make calls. …”
Publicado 2002
Libro electrónico -
6
-
7Publicado 2014“…Hacking Exposed Unified Communications & VoIP , Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. …”
Libro electrónico -
8
-
9
-
10
-
11por Khan, Muhammad Afaq“…Then, to help you plan your network deployments more effectively, the author walks you through realistic deploy-ment scenarios for IP routing, IP services, WAN optimization services, security services, and unified communications. …”
Publicado 2010
Libro electrónico -
12Publicado 2018“…Se presentan en detalle los protocolos TCP/IP: en particular la descomposición en sub-redes en IPv4, así como un nuevo enfoque completo del direccionamiento IP v6 (incluyendo VoIP). …”
Acceso con credenciales UPSA.
Libro electrónico -
13
-
14Publicado 2017Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca)Libro electrónico
-
15Publicado 2024Libro electrónico
-
16por Kammermann, MarkusTabla de Contenidos: “…-- 14.2.1 »Sie machen es dem Angreifer ja auch einfach« -- 14.2.2 Denial-of-Service-Attacken -- 14.2.3 Pufferüberlauf -- 14.2.4 Man-in-the-Middle-Attacken -- 14.2.5 Spoofing -- 14.3 Angriffe gegen IT-Systeme -- 14.3.1 Exploits und Exploit-Kits -- 14.4 Social Engineering -- 14.4.1 Die Ziele des Social Engineers -- 14.4.2 Beliebter Ansatz: Phishing-Mails -- 14.4.3 Tailgating und andere Methoden -- 14.5 Angriffspunkt drahtloses Netzwerk -- 14.6 Der freundliche Mitarbeiter -- 14.7 Fragen zum Kapitel -- Kapitel 15: Die Verteidigung des Netzwerks -- 15.1 Physikalische Sicherheit -- 15.1.1 Zutrittsregelungen -- 15.1.2 Vom Badge bis zur Biometrie -- 15.1.3 Zutrittsschleusen und Videoüberwachung -- 15.1.4 Schutz gegen Einbruch, Feuer und Wasser -- 15.1.5 Klimatisierung und Kühlung -- 15.1.6 Fachgerechte Inventarisierung und Entfernung -- 15.2 Fehlertoleranter Aufbau -- 15.3 Datensicherung -- 15.4 Virenschutz mit Konzept -- 15.5 Netzwerkhärtung -- 15.6 Firewalls -- 15.6.1 Verschiedene Firewall-Typen -- 15.6.2 Das Konzept der DMZ -- 15.6.3 Erweiterte Funktionen einer Firewall -- 15.6.4 Der Proxyserver -- 15.6.5 IDS und IPS -- 15.7 Aktive Suche nach Schwachstellen -- 15.8 Die Rolle des Risiko-Managements -- 15.9 Verteidigungskonzepte -- 15.9.1 Die Auswertung von Überwachungen -- 15.9.2 Notfallvorsorge -- 15.9.3 Die First Responders -- 15.9.4 Und das alles zusammen? …”
Publicado 2022
Libro electrónico -
17por Gallo, Michael A.Tabla de Contenidos: “…Other Internet Initiatives: vBNS/vBNS+, Internet2, Next Generation InternetInternet Administration, Governance, and Standards; History of TCP/IP; TCP/IP Application Layer Protocols: SMTP, MIME, POP, IMAP, TELNET, FTP, and HTTP; TCP/IP Transport Layer Protocols: UDP and TCP; TCP/IP Network Layer Protocol: IP; IPv4 Addresses and Subnetting; IP Address Assignments; IP Name Resolution; IPv6; Internet Services, Resources, and Security; Chapter 4. …”
Publicado 2002
Libro electrónico -
18por Prowell, Stacy J.Tabla de Contenidos: “…Man-in-the-Middle; How Man-in-the-Middle Attacks Work…”
Publicado 2010
Libro electrónico -
19por Santos González, ManuelTabla de Contenidos: “…1.4.2 TRANSFERENCIA DE INFORMACIÓN EN UN (...) 1.4.3 MODELO OSI ; 1.4.4 EL MODELO OSI FRENTE A TCP/IP…”
Publicado 2014
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
20Publicado 2022Tabla de Contenidos: “…Introduction / Helle Porsdam and Sebastian Porsdam Mann -- The dawning of a right : science and the Universal Declaration of Human Rights (1941-1948) -- The origins of the right to science : the American Declaration on the Rights and Duties of Man -- IP rights & human rights : what history tells us and why it matters -- Fostering a love of truth : conceptions of science in UNESCO's early years -- The right to science and the evolution of scientific integrity -- On the right to science as a cultural human right -- Mainstreaming science and human rights in UNESCO -- Considering the right to enjoy the benefits of scientific progress and its applications as a cultural right : a change in perspective -- Implications of the right to science for people with disabilities -- Science in the times of SARS-CoV-2 -- "Fight the fear with the facts!" …”
Libro electrónico