Description |
1 online resource (xii, 253 pages) : illustrations |
Physical Medium |
polychrome |
Description |
text file |
Contents |
What is Asterisk and why do you need it? -- Setting up Asterisk -- Configuring Asterisk -- Writing applications with Asterisk -- Understanding and taking advantage of VoIP protocols -- Asterisk Hardware Ninjutsu -- Threats to VoIP communications systems. |
Summary |
Asterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system and turn it into a samurai sword - for defense or attack! |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Internet telephony.
|
|
Internet telephony. |
Genre/Form |
Electronic books.
|
Added Author |
Clark, Champ, III.
|
Other Form: |
Print version: Jackson, Benjamin. Asterisk hacking. Burlington, MA : Syngress, ©2007 9781597491518 1597491519 (DLC) 2007298761 (OCoLC)166248536 |
ISBN |
9780080554358 (electronic book) |
|
0080554350 (electronic book) |
|
9781597491518 (paperback) |
|
1597491519 (paperback) |
|