Saturday, February 7, 2009

Asterisk or Hacking Exposed

Asterisk: The Future of Telephony

Author: Jim Van Meggelen

This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control of your telephone system.

If you've worked with telephony in the past, you're familiar with the problem: expensive and inflexible systems that are tuned to the vendor's needs, not yours. Asterisk isn't just a candle in the darkness, it's a whole fireworks show. Because Asterisk is so powerful, configuring it can seem tricky and difficult. This book steps you through the process of installing, configuring, and integrating Asterisk with your existing phone system.

You'll learn how to write dialplans, set up applications including speech synthesis and voice recognition, how to script Asterisk, and much more -- everything you need to design a simple but complete system with little or no Asterisk experience, and no more than rudimentary telecommunications knowledge. The book includes:
-A new chapter on managing/administering your Asterisk system
-A new chapter on using Asterisk with databases
-Coverage of features in Asterisk 1.4
-A new appendix on dialplan functions
-A simplified installation chapter
-New simplified SIP configuration, including examples for several popular SIP clients (soft phones and IP telephones)
-Revised chapters and appendicies reviewed and updated for the latest in features, applications, trends and best-practices

Asterisk is revolutionizing the telecom industry, due in large part to the way it gets along with other network applications. While other PBXs are fighting their inevitable absorption into the network, Asterisk embraces it. If you need to take control of your telephony systems, move to Asterisk and see what the future of telecommunications looks like.



Table of Contents:
1A telephony revolution1
2Preparing a system for Asterisk9
3Installing Asterisk31
4Initial configuration of Asterisk58
5Dialplan basics77
6More Dialplan concepts99
7Understanding telephony119
8Protocols for VoIP137
9The Asterisk gateway interface (AGI)156
10Asterisk for the uber-geek175
11Asterisk : the future of telephony190
AVoIP channels209
BApplication reference229
CAGI reference292
DConfiguration files301
EAsterisk command-line interface reference337

Book about: Fundamentos de Desenho Gráficos

Hacking Exposed

Author: Stuart McClur

The tenth anniversary edition of the world's bestselling computer security book!


The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.


Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers.

"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times
"The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine


"A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP, About.com

Stuart McClure, CISSP, CNE, CCSE, was founder, president, and CTO of Foundstone, and ran the worldwide AVERT team at McAfee.

Joel Scambray, CISSP, is chief strategy officer for Leviathan Security Group and was a senior director at Microsoft Corporation focusing on security.

George Kurtz, CISSP, former CEO of Foundstone, is senior vice president and general manager of McAfee's Risk &Compliance Business Unit. All three are the coauthors of the previous editions of Hacking Exposed.



No comments:

Post a Comment