-
2
-
-
33846663248
-
-
available at: www.cse.wustl.edu/ ∼ jain/cis788-99/ftp/voipprotocols/ index.html (accessed 3 June 2005)
-
Arora, R. (2004), Voice over IP: Protocol and Standards: RTP and RTCP available at: www.cse.wustl.edu/ ∼ jain/cis788-99/ftp/voipprotocols/index. html (accessed 3 June 2005).
-
(2004)
Voice over IP: Protocol and Standards: RTP and RTCP
-
-
Arora, R.1
-
3
-
-
33846668743
-
Penetration testing and social engineering hacking
-
Elsevier Ltd, Barking
-
Barrett, N. (2003), "Penetration testing and social engineering hacking", Information Security Technical Report, Vol. 8 No. 4, p. 57, Elsevier Ltd, Barking.
-
(2003)
Information Security Technical Report
, vol.8
, Issue.4
, pp. 57
-
-
Barrett, N.1
-
5
-
-
84926176365
-
-
available at: www.deloitte.com/dtt/research/0,1015, sid%253D1012%2526cid%253D64018,00.html (accessed 6 June 2005)253D64018,00.html (accessed 6 June 2005)
-
Deloitte Research (2004), Getting of the Ground: VoIP Goes Mainstream, available at: www.deloitte.com/dtt/research/0,1015, sid%253D1012%2526cid%253D64018,00.html (accessed 6 June 2005)253D64018,00.html (accessed 6 June 2005).
-
(2004)
Getting of the Ground: VoIP Goes Mainstream
-
-
Research, D.1
-
6
-
-
33846687674
-
-
available at: www.hackingexposedvoip.com/index.php (accessed 29 August 2006)
-
Endler, D. and Collier, M. (2006), Hacking VoIP Exposed, Black Hat Briefing, available at: www.hackingexposedvoip.com/index.php (accessed 29 August 2006).
-
(2006)
Hacking VoIP Exposed, Black Hat Briefing
-
-
Endler, D.1
Collier, M.2
-
8
-
-
33846674863
-
-
(The) Institute for Security and Open Methodologies (ISECOM) (n.d.)
-
(The) Institute for Security and Open Methodologies (ISECOM) (n.d.) available at: www.isecom.org.
-
-
-
-
10
-
-
33846692489
-
-
available at: www.jaynta.com/technology/principlesofspeechcoding.pdf (accessed 2 June 2005)
-
McElroy, C. (2003), Principles of Speech Coding, available at: www.jaynta.com/technology/principlesofspeechcoding.pdf (accessed 2 June 2005).
-
(2003)
Principles of Speech Coding
-
-
McElroy, C.1
-
12
-
-
84870723113
-
-
available at: www.dhs.gov/interweb/assetlibrary/NIACCVSSFinalRpt12-2-04. pdf (accessed 11 July 2005)
-
US National Infrastructure Advisory Council (2004), Common Vulnerability Scoring System, available at: www.dhs.gov/interweb/assetlibrary/ NIACCVSSFinalRpt12-2-04.pdf (accessed 11 July 2005).
-
(2004)
Common Vulnerability Scoring System
-
-
-
13
-
-
33846670215
-
-
US National Security Agency (NSA) Security Configuration Guides (n.d.)
-
US National Security Agency (NSA) Security Configuration Guides (n.d.), available at: www.nsa.gov/snac/.
-
-
-
-
14
-
-
33846704071
-
-
(online), available at: http://nvd.nist.gov/ (accessed between 23 August and 9 September 2005)
-
US National Vulnerability Database (2005), (online), available at: http://nvd.nist.gov/ (accessed between 23 August and 9 September 2005).
-
(2005)
-
-
National Vulnerability Database, U.S.1
-
15
-
-
33846659375
-
-
available at: www.vopsecurity.org/html/tools.html (accessed 22 July 2005)
-
Voice over Packet Security Forum (2005), SiVus - The VoIP Vulnerability Scanner, available at: www.vopsecurity.org/html/tools.html (accessed 22 July 2005).
-
(2005)
SiVus - The VoIP Vulnerability Scanner
-
-
-
17
-
-
33846695140
-
-
Syngress Publishers New York, NY
-
Baskin, B., Chaffin, L., Cross, M., Kancliz, J., Rosela, A., Shim, C. and Zmolek, A. (2006), Practical VoIP Security, Syngress Publishers, New York, NY.
-
(2006)
Practical VoIP Security
-
-
Baskin, B.1
Chaffin, L.2
Cross, M.3
Kancliz, J.4
Rosela, A.5
Shim, C.6
Zmolek, A.7
-
18
-
-
84926191225
-
-
available at: www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safipwp.pdf
-
Cisco Systems (2003), Safe Blueprint: IP Telephony Security in Depth, available at: www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safipwp.pdf.
-
(2003)
Safe Blueprint: IP Telephony Security in Depth
-
-
Systems, C.1
-
19
-
-
0003187764
-
Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
-
European Parliament and the Council (1995), "Directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data", Journal of the European Communities, Vol. L No. 281, p. 31.
-
(1995)
Journal of the European Communities
, vol.50
, Issue.281
, pp. 31
-
-
Parliament, E.1
Council, T.2
-
20
-
-
84856879037
-
-
(online), available at: www.opsi.gov.uk/acts/acts1998/19980029.htm
-
Great Britain Parliament (1988), The Data Protection Act 1988, (online), available at: www.opsi.gov.uk/acts/acts1998/19980029.htm.
-
(1988)
The Data Protection Act 1988
-
-
Britain Parliament, G.1
|