Related Books
Language: en
Pages: 561
Pages: 561
Type: BOOK - Published: 2013-12-20 - Publisher: McGraw Hill Professional
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
Language: en
Pages: 576
Pages: 576
Type: BOOK - Published: 2007 - Publisher: McGraw Hill Professional
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
Language: en
Pages: 0
Pages: 0
Type: BOOK - Published: 2014 - Publisher:
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking Expos
Language: en
Pages: 2353
Pages: 2353
Type: BOOK - Published: 2014-03-24 - Publisher: John Wiley & Sons
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immed
Language: en
Pages: 320
Pages: 320
Type: BOOK - Published: 2013-08-05 - Publisher: McGraw Hill Professional
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps