VoIP and PBX Security and ForensicsConfidentiality, Integrity, and Availability Threats in PBXs
VoIP and PBX Security and Forensics: Confidentiality, Integrity, and Availability Threats in PBXs
Androulidakis, Iosif I.
2016-04-26 00:00:00
[In this introductory chapter we will briefly describe and group as many as possible of the threats in confidentiality, integrity and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/voip-and-pbx-security-and-forensics-confidentiality-integrity-and-qSLpJlGkJo
VoIP and PBX Security and ForensicsConfidentiality, Integrity, and Availability Threats in PBXs
[In this introductory chapter we will briefly describe and group as many as possible of the threats in confidentiality, integrity and availability that PBXs are facing. As such it will be the basis for the technical discussions that will follow in the next chapters. It will also help better understand how to apply the security measures presented in the respective chapter later on.]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.