It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01509cam 2200313Ia 4500
001 9922481350001661
005 20150423144008.0
008 070822s2007 maua 001 0 eng d
010 $a 2007298761
020 $a9781597491518 (pbk.)
020 $a1597491519 (pbk.)
035 $a(CSdNU)u304409-01national_inst
035 $a(OCoLC)166248536
035 $a(OCoLC)166248536
035 $a(OCoLC)166248536
040 $aSINAP$cSINAP$dBAKER$dCOF$dYDXCP$dDLC$dCNU$dOrLoB-B
049 $aCNUM
050 00 $aTK5105.8865$b.J33 2007
100 1 $aJackson, Benjamin.
245 10 $aAsterisk hacking :$btoolkit and liveCD /$cBenjamin Jackson, Champ Clark III ; Larry Chaffin and Johnny Long, technical editors.
246 3 $aAsterisk hacking :$btoolkit and live CD
260 $aBurlington, MA :$bSyngress,$cc2007.
300 $axii, 253 p. :$bill. ;$c24 cm. +$e1 CD-ROM (4 3/4 in.)
505 0 $aCh. 1. What is Asterisk and why do you need it? -- Ch. 2. Setting up Asterisk -- Ch. 3. Configuring Asterisk -- Ch. 4. Writing applications with Asterisk -- Ch. 5. Understanding and taking advantage of VoIP protocols -- Ch. 6. Asterisk hardware Ninjutsu -- Ch. 7. Threats to VoIP communications systems.
650 0 $aInternet telephony.
700 1 $aClark, Champ,$cIII.
994 $aC0$bCNU
999 $aTK 5105.8865 .J33 2007$wLC$c1$i31786102201966$d2/1/2012$lCIRCSTACKS $mNULS$q1$rY$sY$tBOOK$u9/25/2007
999 $aTK 5105.8865 .J33 2007 CD$wLC$c1$i31786102503015$lMULTIMEDIA$mNULS$rY $sY$tCD-ROM$u9/25/2007