logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Pbx Security And Forensics A Practical Approach 1st Edition Iosif I Androulidakis Auth

  • SKU: BELL-4231104
Pbx Security And Forensics A Practical Approach 1st Edition Iosif I Androulidakis Auth
$ 31.00 $ 45.00 (-31%)

4.0

56 reviews

Pbx Security And Forensics A Practical Approach 1st Edition Iosif I Androulidakis Auth instant download after payment.

Publisher: Springer-Verlag New York
File Extension: PDF
File size: 2.96 MB
Pages: 115
Author: Iosif I. Androulidakis (auth.)
ISBN: 9781461416555, 9781461416562, 1461416558, 1461416566
Language: English
Year: 2013
Edition: 1

Product desciption

Pbx Security And Forensics A Practical Approach 1st Edition Iosif I Androulidakis Auth by Iosif I. Androulidakis (auth.) 9781461416555, 9781461416562, 1461416558, 1461416566 instant download after payment.

PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other users in the Public Switched Telephone Network (PSTN). Targeted damages and attacks in PBXs can cause significant instability and problems. The author provides examples of these threats and how to prevent against such attacks in the future. Readers will also be shown where to find forensics data and how to conduct relevant analysis.

Related Products