This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving P
VoIP and PBX Security and Forensics: A Practical Approach
โ Scribed by Iosif I. Androulidakis (auth.)
- Publisher
- Springer International Publishing
- Year
- 2016
- Tongue
- English
- Leaves
- 112
- Series
- SpringerBriefs in Electrical and Computer Engineering
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. The new edition includes a major update and extension to the VoIP sections in addition to updates to forensics.
โฆ Table of Contents
Front Matter....Pages i-xi
Introduction....Pages 1-8
Confidentiality, Integrity, and Availability Threats in PBXs....Pages 9-24
PBX Technical Details....Pages 25-54
PBX Security....Pages 55-73
PBX Forensics....Pages 75-99
Conclusions....Pages 101-101
Back Matter....Pages 103-103
โฆ Subjects
Communications Engineering, Networks; Systems and Data Security; Security Science and Technology; Forensic Science
๐ SIMILAR VOLUMES
<p><p>PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other us
<p><p>Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secret
<p><p>This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the n
The Growing Imperative Need for Effective Information Security Governance<p>With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses. The succession of corporate debacles and dramatic control failures in recent years underscores the ne