Ebook: Asterisk Hacking. Toolkit and Live Cd
Content:
Co-Authors, Page v
Technical Editors, Page vi
Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
Chapter 2 - Setting Up Asterisk, Pages 21-64
Chapter 3 - Configuring Asterisk, Pages 65-114
Chapter 4 - Writing Applications with Asterisk, Pages 115-145
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
Index, Pages 245-253
Co-Authors, Page v
Technical Editors, Page vi
Chapter 1 - What Is Asterisk and Why Do You Need It?, Pages 1-20
Chapter 2 - Setting Up Asterisk, Pages 21-64
Chapter 3 - Configuring Asterisk, Pages 65-114
Chapter 4 - Writing Applications with Asterisk, Pages 115-145
Chapter 5 - Understanding and Taking Advantage of VoIP Protocols, Pages 147-181
Chapter 6 - Asterisk Hardware Ninjutsu, Pages 183-224
Chapter 7 - Threats to VoIP Communications Systems, Pages 225-244
Index, Pages 245-253
Download the book Asterisk Hacking. Toolkit and Live Cd for free or read online
Continue reading on any device:
Last viewed books
Related books
{related-news}
Comments (0)