Flylib.com
H
Previous page
Table of content
Next page
H.323 protocol, 258
Hammer Call Analyzer, 128
hard phones.
See also
phones
Asterisk, 325
Avaya communication devices, 256257
Cisco, 207210
hardening
Cisco phones, 247248
Cisco switches, 246247
network perimeter, 135
networks, 135136
servers, 136
VoIP phones, 136
help pages, 1213, 17
hijacking
network, 169
reghijacker tool, 445455
REGISTER requests , 446452
registration, 186, 438456
SIP phones, 438456
HINFO information record, 27
host-based intrusion prevention, 310
host/device discovery, 3243
host/device identification, 4753
hping2 tool, 41
hubs, network, 149150
HYPERLINK standard, 154
Previous page
Table of content
Next page
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158
Authors:
David Endler
,
Mark Collier
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
The Waterfall Development Model
Measurement Errors
Design and Complexity Metrics
Availability Metrics
1 Definition and Measurements of System Availability
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
The Cisco 7970G IP Phone
Implementing Shared Lines and Hunt Groups
Creating an Intercom
Cisco IOS PSTN Telephony Interfaces
Summary
Building Web Applications with UML (2nd Edition)
Summary
Discussion
Glossary
Mapping to the UX Model
Analysis Model Classes
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Creating a Search Engine with Lucene
Building the JavaEdge Application with Ant and Anthill
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Product History
Setting Up the System Clock
AIP-SSM Module Software Recovery
Summary
WebVPN
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Triggers
Attacking Oracle PL/SQL Web Applications
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies