Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system.
This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack.
- Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more!
- See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
New and experienced Asterisk users
What is Asterisk and why do you need it?
Add-ons and Modules
Asterisk Hardware Ninjutsu
Protocols, say what?
Lock it down!
Reach out and touch someone: The future of Asterisk Hacking
- No. of pages:
- © Syngress 2007
- 29th June 2007
- Paperback ISBN:
- eBook ISBN:
External Threat Assessment Team, Secure Science Corporation, San Diego, CA
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.