Normal view MARC view ISBD view

PBX Security and Forensics [electronic resource] : A Practical Approach / by Iosif I. Androulidakis.

By: Androulidakis, Iosif I [author.].
Contributor(s): SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: SpringerBriefs in Electrical and Computer Engineering: Publisher: New York, NY : Springer New York : Imprint: Springer, 2013Description: XX, 115 p. 85 illus. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9781461416562.Subject(s): Engineering | Forensic science | Computer security | System safety | Electrical engineering | Engineering | Communications Engineering, Networks | Systems and Data Security | Security Science and Technology | Forensic ScienceAdditional physical formats: Printed edition:: No titleDDC classification: 621.382 Online resources: Click here to access online
Contents:
Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.
In: Springer eBooksSummary: PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.
    average rating: 0.0 (0 votes)
No physical items for this record

Introduction -- Confidentiality, Integrity and Availability of Threats in PBX -- PBX Technical Details -- PBX Security -- PBX Forensics -- Conclusions.

PBX Security and Forensics begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. This book discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and Forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems.

There are no comments for this item.

Log in to your account to post a comment.