| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA990002932910203316 |
|
|
Autore |
PAVOLINI, Carlo |
|
|
Titolo |
Ostia / Carlo Pavolini |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Roma [etc.] : Laterza, 2006 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
XII, 339 p. : ill. ; 22 cm |
|
|
|
|
|
|
Collana |
|
Guide archeologiche Laterza ; 8 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Ostia antica Guide archeologiche |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910154814103321 |
|
|
Autore |
Connolly Thomas M. |
|
|
Titolo |
Business database systems / / Thomas Connolly, Carolyn Begg, Richard Holowczak |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Harlow, England : , : Pearson, , [2008] |
|
©2008 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-282-07101-7 |
9786612071010 |
1-4058-7450-3 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (593 pages) : illustrations (some color), tables, graphs |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
Business Database Systems arms you with the knowledge to analyse, design and implement effective, robust and successful databases. This book is ideal for students of Business/Management Information Systems, or Computer Science, who will be expected to take a course in database systems for their degree programme. It is also excellently suited to any practitioner who needs to learn, or refresh their knowledge of, the essentials of database management systems. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910784058403321 |
|
|
Autore |
Porter Thomas |
|
|
Titolo |
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-03569-6 |
9786611035693 |
0-08-048955-9 |
1-4237-5774-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (592 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Internet telephony - Security measures |
Telecommunication |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network |
|
|
|
|
|
|
|
|
|
|
|
Traffic; Chapter 14 IETF Encryption Solutions for VoIP |
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network |
|
|
|
|
|
|
|
| |