PBX Security and Forensics A Practical Approach /

PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security a...

Full description

Bibliographic Details
Main Author: Androulidakis, Iosif I. (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic
Language:English
Published: New York, NY : Springer New York : Imprint: Springer, 2013.
Series:SpringerBriefs in Electrical and Computer Engineering,
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-1656-2
LEADER 02361nam a22004935i 4500
001 12833
003 DE-He213
005 20130726172718.0
007 cr nn 008mamaa
008 120725s2013 xxu| s |||| 0|eng d
020 # # |a 9781461416562  |9 978-1-4614-1656-2 
024 7 # |a 10.1007/978-1-4614-1656-2  |2 doi 
050 # 4 |a TK1-9971 
072 # 7 |a TJK  |2 bicssc 
072 # 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.382  |2 23 
100 1 # |a Androulidakis, Iosif I.  |e author. 
245 1 0 |a PBX Security and Forensics  |b A Practical Approach /  |c by Iosif I. Androulidakis.  |h [electronic resource] : 
264 # 1 |a New York, NY :  |b Springer New York :  |b Imprint: Springer,  |c 2013. 
300 # # |a XX, 115 p. 85 illus.  |b online resource. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
347 # # |a text file  |b PDF  |2 rda 
490 1 # |a SpringerBriefs in Electrical and Computer Engineering,  |x 2191-8112 
505 0 # |a Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions. 
520 # # |a PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. 
650 # 0 |a Engineering. 
650 # 0 |a Forensic medicine. 
650 # 0 |a Data protection. 
650 # 0 |a Telecommunication. 
650 1 4 |a Engineering. 
650 2 4 |a Communications Engineering, Networks. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Security Science and Technology. 
650 2 4 |a Forensic Science. 
710 2 # |a SpringerLink (Online service) 
773 0 # |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9781461416555 
830 # 0 |a SpringerBriefs in Electrical and Computer Engineering,  |x 2191-8112 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-1656-2 
912 # # |a ZDB-2-ENG 
950 # # |a Engineering (Springer-11647)