Normal view MARC view ISBD view

PBX Security and Forensics [electronic resource] : A Practical Approach / by Iosif I. Androulidakis.

By: Androulidakis, Iosif I [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Electrical and Computer Engineering: Publisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: XX, 115 p. 85 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781461416562.Subject(s): Engineering | Forensic medicine | Data protection | Telecommunication | Engineering | Communications Engineering, Networks | Systems and Data Security | Security Science and Technology | Forensic ScienceDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.
In: Springer eBooksSummary: PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.

PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

There are no comments for this item.

Log in to your account to post a comment.

2017 | The Technical University of Kenya Library | +254(020) 2219929, 3341639, 3343672 | library@tukenya.ac.ke | Haile Selassie Avenue