Skype Hacks

Skype Hacks
Author: Andrew Sheppard
Publisher: "O'Reilly Media, Inc."
Total Pages: 342
Release: 2006
Genre: Computers
ISBN: 0596101899

"Tips & tools for cheap, fun, innovative phone service"--Cover.

Big Book of Windows Hacks

Big Book of Windows Hacks
Author: Preston Gralla
Publisher: "O'Reilly Media, Inc."
Total Pages: 655
Release: 2007
Genre: Computers
ISBN: 0596528353

This useful book gives Windows power users everything they need to get the most out of their operating system, its related applications, and its hardware.

VoIP Hacks

VoIP Hacks
Author: Ted Wallingford
Publisher: "O'Reilly Media, Inc."
Total Pages: 326
Release: 2006
Genre: Computers
ISBN: 0596101333

Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals with dozens of hands-on projects for building a VoIP network, including a softPBX.

Linux Multimedia Hacks

Linux Multimedia Hacks
Author: Kyle Rankin
Publisher: "O'Reilly Media, Inc."
Total Pages: 330
Release: 2006
Genre: Computers
ISBN: 0596100760

Presents Linux's multimedia tools with step-by-step instructions to maximize entertainment capabilities for images, audio, and video.

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Author: David Endler
Publisher: McGraw Hill Professional
Total Pages: 576
Release: 2007
Genre: Computers
ISBN: 0072263644

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams

The Ability Hacks

The Ability Hacks
Author: Peter Lee
Publisher:
Total Pages: 154
Release: 2018-06-27
Genre:
ISBN: 9781983089978

The Ability Hacks is the story of two Microsoft hackathon teams, one in the summer of 2014 and one the following summer of 2015. The first would pioneer new software to revolutionize the mobility of tens of thousands of people who live with severe paralysis caused by ALS, Parkinson's, cerebral palsy and traumatic neurological injuries. The second team would pioneer software to help kids with dyslexia read and love learning for the first time in their lives. This is the story of two small groups of driven, focused and passionate software engineers, program managers, marketers and advocates. It's the story of realizing the transformative power of technology for people with disabilities, not just for traditional consumer and industrial markets. It's the story of doing something truly great -- improving outcomes for everyone, discovering a design ethos and blazing a new trail for accessibility. Read more:More than one billion people around the world live with a disability of some kind, and it's estimated two-thirds of us know someone with a disability. Almost everyone will be temporarily or permanently impaired at some point in life, and those who survive to old age will experience increasing difficulties in functioning, according to the World Health Organization. This book explores an optimistic belief that computer software and hardware can empower people with disabilities in a multitude of scenarios. As one engineer interviewed for The Ability Hacks said, "It's not about the technology. It's about the people."

Take This Stuff and Hack It!

Take This Stuff and Hack It!
Author: Dave Prochnow
Publisher: McGraw Hill Professional
Total Pages: 494
Release: 2006
Genre: Digital media
ISBN: 0071477373

This guide shows how 30 common household items can be hacked and tweaked into products totally different than what the manufacturer intended. Garage and basement tinkerers will get fully illustrated coverage of which products are 'hackable', how to hack them and how to convert them into some unique, fun stuff.

Security Metrics, A Beginner's Guide

Security Metrics, A Beginner's Guide
Author: Caroline Wong
Publisher: McGraw Hill Professional
Total Pages: 433
Release: 2011-10-06
Genre: Computers
ISBN: 0071744010

Security Smarts for the Self-Guided IT Professional “An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program!”—Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program. This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. Security Metrics: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay, where she built the security metrics program from the ground up. She has been a featured speaker at RSA, ITWeb Summit, Metricon, the Executive Women's Forum, ISC2, and the Information Security Forum.