Securiing VOIP (Record no. 16589)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 01494nam a2200265Ia 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250725095749.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 220909b |||||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780124170391 |
| 037 ## - SOURCE OF ACQUISITION | |
| Terms of availability | Textbook |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | CSL |
| Language of cataloging | eng |
| Transcribing agency | CSL |
| 041 ## - LANGUAGE CODE | |
| Language code of text/sound track or separate title | eng |
| 084 ## - COLON CLASSIFICATION NUMBER | |
| Classification number | D65,8(B):71:(894) Q5 TD |
| Assigning agency | CSL |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Bates, Regis J. (Bud) |
| Relator term | author |
| 9 (RLIN) | 615558 |
| 245 #0 - TITLE STATEMENT | |
| Title | Securiing VOIP |
| Remainder of title | : keeping your VOIP network safe |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Waltham : |
| Name of publisher, distributor, etc. | Elsevier, |
| Date of publication, distribution, etc. | 2015. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xiii, 207p. |
| Other physical details | : ill. |
| 500 ## - GENERAL NOTE | |
| General note | Index 199-207p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Authentication |
| 9 (RLIN) | 816467 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Final thoughts |
| 9 (RLIN) | 816468 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Cryptography solutions |
| 9 (RLIN) | 816469 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Classification part | D65,8(B):71:(894) Q5 TD |
| Koha item type | Textbook |
| Source of classification or shelving scheme | Colon Classification (CC) |
| Suppress in OPAC | No |
| Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Central Science Library | Central Science Library | 2022-09-12 | 442, 10/03/2015, Limpid Book Service | D65,8(B):71:(894) Q5 TD | SL1598082 | 2022-09-12 | 2022-09-12 | Textbook |
