Author | : Andrew Sheppard |
Publisher | : "O'Reilly Media, Inc." |
Total Pages | : 342 |
Release | : 2006 |
Genre | : Computers |
ISBN | : 0596101899 |
"Tips & tools for cheap, fun, innovative phone service"--Cover.
Author | : Andrew Sheppard |
Publisher | : "O'Reilly Media, Inc." |
Total Pages | : 342 |
Release | : 2006 |
Genre | : Computers |
ISBN | : 0596101899 |
"Tips & tools for cheap, fun, innovative phone service"--Cover.
Author | : Preston Gralla |
Publisher | : "O'Reilly Media, Inc." |
Total Pages | : 655 |
Release | : 2007 |
Genre | : Computers |
ISBN | : 0596528353 |
This useful book gives Windows power users everything they need to get the most out of their operating system, its related applications, and its hardware.
Author | : Ted Wallingford |
Publisher | : "O'Reilly Media, Inc." |
Total Pages | : 326 |
Release | : 2006 |
Genre | : Computers |
ISBN | : 0596101333 |
Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals with dozens of hands-on projects for building a VoIP network, including a softPBX.
Author | : Kyle Rankin |
Publisher | : "O'Reilly Media, Inc." |
Total Pages | : 330 |
Release | : 2006 |
Genre | : Computers |
ISBN | : 0596100760 |
Presents Linux's multimedia tools with step-by-step instructions to maximize entertainment capabilities for images, audio, and video.
Author | : David Endler |
Publisher | : McGraw Hill Professional |
Total Pages | : 576 |
Release | : 2007 |
Genre | : Computers |
ISBN | : 0072263644 |
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams
Author | : Peter Lee |
Publisher | : |
Total Pages | : 154 |
Release | : 2018-06-27 |
Genre | : |
ISBN | : 9781983089978 |
The Ability Hacks is the story of two Microsoft hackathon teams, one in the summer of 2014 and one the following summer of 2015. The first would pioneer new software to revolutionize the mobility of tens of thousands of people who live with severe paralysis caused by ALS, Parkinson's, cerebral palsy and traumatic neurological injuries. The second team would pioneer software to help kids with dyslexia read and love learning for the first time in their lives. This is the story of two small groups of driven, focused and passionate software engineers, program managers, marketers and advocates. It's the story of realizing the transformative power of technology for people with disabilities, not just for traditional consumer and industrial markets. It's the story of doing something truly great -- improving outcomes for everyone, discovering a design ethos and blazing a new trail for accessibility. Read more:More than one billion people around the world live with a disability of some kind, and it's estimated two-thirds of us know someone with a disability. Almost everyone will be temporarily or permanently impaired at some point in life, and those who survive to old age will experience increasing difficulties in functioning, according to the World Health Organization. This book explores an optimistic belief that computer software and hardware can empower people with disabilities in a multitude of scenarios. As one engineer interviewed for The Ability Hacks said, "It's not about the technology. It's about the people."
Author | : Dave Prochnow |
Publisher | : McGraw Hill Professional |
Total Pages | : 494 |
Release | : 2006 |
Genre | : Digital media |
ISBN | : 0071477373 |
This guide shows how 30 common household items can be hacked and tweaked into products totally different than what the manufacturer intended. Garage and basement tinkerers will get fully illustrated coverage of which products are 'hackable', how to hack them and how to convert them into some unique, fun stuff.
Author | : Caroline Wong |
Publisher | : McGraw Hill Professional |
Total Pages | : 433 |
Release | : 2011-10-06 |
Genre | : Computers |
ISBN | : 0071744010 |
Security Smarts for the Self-Guided IT Professional “An extraordinarily thorough and sophisticated explanation of why you need to measure the effectiveness of your security program and how to do it. A must-have for any quality security program!”—Dave Cullinane, CISSP, CISO & VP, Global Fraud, Risk & Security, eBay Learn how to communicate the value of an information security program, enable investment planning and decision making, and drive necessary change to improve the security of your organization. Security Metrics: A Beginner's Guide explains, step by step, how to develop and implement a successful security metrics program. This practical resource covers project management, communication, analytics tools, identifying targets, defining objectives, obtaining stakeholder buy-in, metrics automation, data quality, and resourcing. You'll also get details on cloud-based security metrics and process improvement. Templates, checklists, and examples give you the hands-on help you need to get started right away. Security Metrics: A Beginner's Guide features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work Caroline Wong, CISSP, was formerly the Chief of Staff for the Global Information Security Team at eBay, where she built the security metrics program from the ground up. She has been a featured speaker at RSA, ITWeb Summit, Metricon, the Executive Women's Forum, ISC2, and the Information Security Forum.