Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 2: Scanning a VoIP Network
TCP/IP Handshake and Connection Flags
Chapter 4: VoIP Network Infrastructure Denial of Service (DoS)
Botnets
Chapter 7: Cisco Unified CallManager
Vendor Comment
Chapter 8: Avaya Communication Manager
Vendor Comment
Previous page
Table of content
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Strategies for Information Technology Governance
Integration Strategies and Tactics for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Measuring ROI in E-Commerce Applications: Analysis to Action
The Evolution of IT Governance at NB Power
C++ How to Program (5th Edition)
Terminology
Recursion vs. Iteration
Pointer Operators
Arrays of Pointers
Wrap-Up
Cisco IOS Cookbook (Cookbooks (OReilly))
Viewing Frame Relay Status Information
Creating a Router-to-Router VPN with RSA Keys
Connecting VLAN Trunks with 802.1Q
Logging Unauthorized SNMP Attempts
Using NAT for Server Load Distribution
Information Dashboard Design: The Effective Visual Communication of Data
Exceeding the Boundaries of a Single Screen
Choosing a Deficient Measure
Cluttering the Display with Useless Decoration
Applying the Principles of Visual Perception to Dashboard Design
Sample Sales Dashboard
File System Forensic Analysis
Background
RAID
Summary
File System Metadata Files
Block and Fragment Bitmaps
.NET System Management Services
.NET Framework and Windows Management Instrumentation
Using the System.Management Namespace
Querying WMI
The WMI Schema
WMI Security
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies