www.tipntec.com   IT±â±â, IT¼­Àû Á÷°Å·¡ ÄĹ´ÏƼ ÆÁ¿£Å×Å©
 1% ÇÔ²² ³ª´® Ŭ¸¯ !
·Î±×ÀÎ
[ ID/Passã±â ]
ÀÐÁö¾ÊÀº ÂÊÁö
(0)
ÀÏ ¹Ý ÆÇ ¸Å ºÐ ·ù
¡¡
ISBN Ã¥ °¡°Ýºñ±³
ώ ¿¹½º24 ώ ±³º¸¹®°í
ώ ¾Ë¶óµò ώ ÀÎÅÍÆÄÅ©
ώ ¸®ºê·Î ώ ¿µÇ³¹®°í
ώ ºÏ¹Ì¸£ ώ ºÏ½ºÄµ
ώ 11st ώ ¹Ýµð¾Ø...
ώ Áö¸¶ÄÏ ώ ÆÁ¿£Å×Å©
[ ¾÷¹«½Ã°£ ]
¿ù~±Ý (Åä.ÀÏ ÈÞ¹«)
am: 10½Ã ~ pm: 7½Ã
Á¡½É: 12½Ã ~ 1½Ã
tipntec@gmail.com
Home >> »ó¼¼º¸±â
ÀÌÀü
- ºÐ·ùÀ§Ä¡ >> (°³¹ß)¹æ¹ý·Ð/·¹ÆÛ·±½º >> ¾ÏÈ£/º¸¾È/ÇØÅ· >>
Á¦¸ñ : Hacking Exposed Voip
»õÃ¥Á¤°¡ : 89,940¿ø ÆǸŰ¡°Ý : 40,000¿ø
ISBN : 9780072263640 ÃâÆÇÀÏ : -
Àú ÀÚ : Endler, David/ Collier, Mark ÃâÆÇ»ç : McGraw-Hill Osborne Media
Ã¥»óÅ : AA±Þ(±¸ÀÔÈÄ °ÅÀǺ»Àû¾ø´Â »õÃ¥)
ÆǸŰ¡´É±Ç(Áú)¼ö: 0 ±Ç(Áú)  
¹è¼Û¿ä±Ý : 0¿ø / ¹è¼Ûºñ ÆǸÅÀںδã(¹«·á¹è¼Û)
¹è¼Û¹æ¹ý : Åùè¹è¼Û
¹ÝÇ°¿©ºÎ : ¹ÝÇ°¹è¼Ûºñ ±¸¸ÅÀÚ ºÎ´ãÀÏ°æ¿ì¸¸ ¹ÝÇ°°¡´É ÇÕ´Ï´Ù. ¡¡
ÆǸŰ¡´ÉÁö¿ª : Àü±¹(Á¦ÁÖ,µµ¼­Áö¿ªÆ÷ÇÔ)
ÆǸÅÀÚÁ¤º¸(ID / ÆǸŵî±Þ) : pak713[ ] / (Æò¹Î)
»çÁø1
(ÆǸſϷá)
ÆǸÅÀÚ Ã¥»óÅ ¼³¸í :

ȸ»çÀ̸§ÀÌ µÞÀå¿¡ ÀûÇôÀÖ½À´Ï´Ù.
¾ðµíº¸¸é °ÅÀÇ »õÃ¥À̱¸¿ä
ÇÊ¿äÇϽźР¿¬¶ô ÁÖ¼¼¿ä.


¢Ñ  ÆǸÅÀÚ¿Í °¡°Ý Á¶Á¤À» ¿øÇϽøé ÂÊÁö ¶Ç´Â ´ñ±ÛÀ» ÀÌ¿ëÇØ º¸¼¼¿ä.

¢Ñ  ´ñ±Û¾²±â(ÇöÀç 0 / 500byte):
               ´ñ±ÛÀº ÂÊÁö¿Í ¸ÞÀϷεµ ÆǸÅÀÚ¿¡°Ô ÀÚµ¿¹ß¼Û µÇ¾î Æí¸® ÇÕ´Ï´Ù.

[pak713] ÂÊÁöµå·È½À´Ï´Ù. (2009-02-27 ¿ÀÀü 10:20:41)
[mongkeys] °¡°Ý Á¶±Ý Á¶Á¤ÇÏ°í½ÍÀºµ¥¿ä~ °¡´ÉÇÑÁö... ¦UÁöÁ» ÁÖ¼¼¿ä~ (2009-02-26 ¿ÀÈÄ 11:31:42)

³» ¿ë :

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." __Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step_by_step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware_specific and network_centered security issues are covered alongside detailed countermeasures, in_depth examples, and hands_on implementation techniques. Inside, you"ll learn how to defend against the latest DoS, man_in_the_middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.


Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware

Fortify Cisco, Avaya, and Asterisk systems

Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation

Thwart number harvesting, call pattern tracking, and conversation eavesdropping

Measure and maintain VoIP network quality of service and VoIP conversation quality

Stop DoS and packet flood_based attacks from disrupting SIP proxies and phones

Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks

Avoid insertion/mixing of malicious audio

Learn about voice SPAM/SPIT and how to prevent it

Defend against voice phishing and identity theft scams

¸ñ Â÷ :
±â Ÿ :
ȸ»ç¸í: ÆÁ¿£Å×Å© | Á¤º¸Ã¥ÀÓÀÚ: À̷̹¡ | »ç¾÷ÀÚµî·Ï¹øÈ£: 108-17-55826 | À̸ÞÀÏÁÖ¼Ò ¹«´Ü¼öÁý °ÅºÎ
¼­¿ï½Ã ¿µµîÆ÷±¸ ½Å±æµ¿ 198  DNB  201È£ Contact tipntec@gmail.com more information.
Copyleft¨Ï2008 TipnTec. All Rights Not Reserved.