๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

PBX Security and Forensics: A Practical Approach

โœ Scribed by Iosif I. Androulidakis (auth.)


Publisher
Springer-Verlag New York
Year
2013
Tongue
English
Leaves
108
Series
SpringerBriefs in Electrical and Computer Engineering
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the Public Switched Telephone Network (PSTN). Targeted damages and attacks in PBXs can cause significant instability and problems. The author provides examples of these threats and how to prevent against such attacks in the future. Readers will also be shown where to find forensics data and how to conduct relevant analysis.

โœฆ Table of Contents


Front Matter....Pages i-xi
Introduction....Pages 1-8
Confidentiality, Integrity, and Availability Threats in PBXs....Pages 9-21
PBX Technical Details....Pages 23-52
PBX Security....Pages 53-69
PBX Forensics....Pages 71-96
Conclusions....Pages 97-98

โœฆ Subjects


Communications Engineering, Networks;Systems and Data Security;Security Science and Technology;Forensic Science


๐Ÿ“œ SIMILAR VOLUMES


VoIP and PBX Security and Forensics: A P
โœ Iosif I. Androulidakis ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer ๐ŸŒ English

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving P

VoIP and PBX Security and Forensics: A P
โœ Iosif I. Androulidakis (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics invol

Mobile Phone Security and Forensics: A P
โœ Iosif I. Androulidakis (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Springer-Verlag New York ๐ŸŒ English

<p><p>Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secret

Mobile Phone Security and Forensics: A P
โœ Iosif I. Androulidakis (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones

Information Security Planning: A Practic
โœ Susan Lincke ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<p><span>This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a securit

Information security governance: a pract
โœ Krag Brotby ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐Ÿ› Wiley ๐ŸŒ English

The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the n