[Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Research and Paper on PBX security, exchange security and telecommunication security?

Posted on 2004-10-07
2
Medium Priority
?
252 Views
Last Modified: 2010-04-11
hi
i want to learn the security issues related to PBX,telephone Exchange and telecomminications from beginning to advance level. is there any comprehensive material and sites avaible on internet. i cant find any , there is just introduction , is there any thesis releted to it , please tell me urgent as i want to explain things related to it to my boss.
thanks in advance
0
Comment
Question by:baburkhan
2 Comments
 
LVL 3

Accepted Solution

by:
fadiramada earned 160 total points
ID: 12281502
Hello,

Hope these links help:

http://iroi.seu.edu.cn/books/ee_dic/whatis/pbx.htm

http://www.telecommagazine.com/

This should be more than enough,

Thanks,

Fadi Ramada.
Net+, Security+
0
 

Author Comment

by:baburkhan
ID: 12409045
no man i searched the above sites but cant find any good and explainatary material on them.there are papers from different companies but relate to their own scenario and services. is there any other site?
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
Your business may be under attack from a silent enemy that is hard to detect. It works stealthily in the shadows to access and exploit your critical business information, sensitive confidential data and intellectual property, for commercial gain. T…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

865 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question