LEADER 01496nam 2200385 a 450 001 9910697058103321 005 20230902161954.0 035 $a(CKB)5470000002384320 035 $a(OCoLC)713557480 035 $a(EXLCZ)995470000002384320 100 $a20110420d2001 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aPBX vulnerability analysis$b[electronic resource] $efinding holes in your PBX before someone else does /$fD. Richard Kuhn 210 1$aGaithersburg, Md. :$cU.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,$d[2001] 215 $a1 online resource (v, 60 pages) $cillustrations 225 1 $aNIST special publication ;$v800-24.$aComputer security 300 $a"April 2001." 320 $aIncludes bibliographical references (page 52). 410 0$aNIST special publication.$pComputer security. 410 0$aNIST special publication ;$v800-24. 517 $aPBX vulnerability analysis 606 $aTelephone$xPrivate branch exchanges$xSecurity measures$zUnited States 615 0$aTelephone$xPrivate branch exchanges$xSecurity measures 700 $aKuhn$b D. Richard$01162181 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910697058103321 996 $aPBX vulnerability analysis$93504079 997 $aUNINA