1. Hacking exposed VoIP
Author: / David Endler, Mark Collier
Library: Ilam University Central Library (Ilam)
Subject: Internet telephony- Security measures,Computer networks- Security measures
Classification :
TK5105
.
8865
.
E53
2007


2. Hacking exposed VoIP : voice over IP security secrets & solutions
Author: Endler, David
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet telephony,، Computer networks -- Security measures
Classification :
TK
5105
.
8865
.
E53H2


3. Hacking exposed VoIP : voice over IP security secrets & solutions
Author: Endler, David.
Library: Central library and information center (Khorasan Razavi)
Subject: Security measures ، Internet telephony,Security measures ، Computer networks
Classification :
TK
5105
.
8865
.
E53
2007


4. Hacking exposed VoIP: voice over IP security secrets & solutions
Author: Endler, David
Library: (Semnan)
Subject: Security measures ، Internet telephony,Security measures ، Computer networks
Classification :
TK
5105
.
8865
.
E5H3


5. How to cheat at Voip security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; Computer networks ; Security measures. ;

6. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet telephony , Security measures
Classification :
E-BOOK

7. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet telephony--Security measures,Computer networks--Security measures
Classification :
TK
,
5105
.
8865
,.
P67
,
2007


8. How to cheat at Voip security
Author: Porter, Thomas
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet telephony,، Computer networks -- Security measures
Classification :
TK
5105
.
8865
.
P67H6


9. How to cheat at Voip security /
Author: Thomas Porter, Michael Gough
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Internet telephony-- Security measures
Classification :
TK5105
.
8865
.
P67
2007


10. Practical VoIP Securit
Author: / Thomas Porter, et al
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet telephony--Security measures,Telecommunication.
Classification :
TK
,
5105
.
8865
,.
P67
,
2006eb


11. Practical VoIP Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; Telecommunication. ;

12. Practical VoIP Security
Author: / Thomas Porter, et al
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication,Internet telephony , Security measures,Electronic books. , local
Classification :
E-BOOK

13. Practical VoIP security /
Author: Thomas Porter ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet telephony-- Security measures.
Classification :
TK5105
.
886
.
P73
2006


14. Securing VoIP :
Author: Regis J. (Bud) Bates
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet telephony-- Security measures
Classification :
TK5105
.
8865
.
B38
2015


15. Securing VoIP networks
Author: / Peter Thermos and Ari Takanen
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet telephony , Security measures,Electronic books
Classification :
E-BOOK

16. Securing VoIP networks
Author: / Peter Thermos and Ari Takanen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet telephony- Security measures
Classification :
TK5105
.
8865
.
T44
2008


17. Understanding Voice over IP securit
Author: / Alan B. Johnston, David M. Piscitello
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet telephony--Security measures,TCP/IP (Computer network protocol)--Security measures
Classification :
TK
,
5105
.
8865
,.
J64
,
2006eb


18. Understanding Voice over IP security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; TCP/IP (Computer network protocol) ; Security measures. ;

19. Understanding Voice over IP security /
Author: Alan B. Johnston, David M. Piscitello.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet telephony-- Security measures.,TCP/IP (Computer network protocol)-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Internettelefonie
Classification :
TK5105
.
8865
.
J64
2006eb


20. Understanding Voice over IP security
Author: Johnston, Alan B.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Internet telephony,Security measures ، TCP/IP )Computer network protocol(
Classification :
TK
5105
.
8865
.
J64
2006

