The analysis and modeling of efficiency of the developed telecommunication networks on the basis of IP PBX asterisk now / T. G. Serikov, A. Mekhtiyev (Mekhtiev), V. V. Yugay [et al.]

Уровень набора: (RuTPU)RU\TPU\network\20157, 11th International Forum on Strategic Technology (IFOST 2016), 1-3 June 2016, Novosibirsk, Russiain, in 2 pt., [proceedings] / Novosibirsk State Technical University = 2016Альтернативный автор-лицо: Serikov, T. G.;Mekhtiyev (Mekhtiev), A., Specialist in the field of electronics, Senior researcher of Tomsk Polytechnic University, Candidate of technical sciences, 1972-, Ali;Yugay, V. V.;Muratova, A. K.;Yakubova, M. Z.;Razinkin, V. P.;Okhorzina, A. V.;Yurchenko, A. V., physicist, Professor of Tomsk Polytechnic University, candidate of technical sciences, 1974-, Aleksey Vasilievich;Alkina, A. D.Коллективный автор (вторичный): Национальный исследовательский Томский политехнический университет (ТПУ), Институт неразрушающего контроля (ИНК), Кафедра промышленной и медицинской электроники (ПМЭ)Язык: английский.Страна: Россия.Серия: Information and communication technologiesРезюме или реферат: Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered..Примечания о наличии в документе библиографии/указателя: [References: p. 514 (8 tit.)].Аудитория: .Тематика: электронный ресурс | труды учёных ТПУ | WiFi | wireless network | attacks | address | network devices | server | Asterisk NOW | беспроводные сети | атаки | адреса | серверы | телекоммуникационные сети Ресурсы он-лайн:Щелкните здесь для доступа в онлайн
Тэги из этой библиотеки: Нет тэгов из этой библиотеки для этого заглавия. Авторизуйтесь, чтобы добавить теги.
Оценка
    Средний рейтинг: 0.0 (0 голосов)
Нет реальных экземпляров для этой записи

Title screen

[References: p. 514 (8 tit.)]

Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop that has the software package of CommView for WiFi. The analysis of stability program by automatic telephone exchange on the basis of Asterisk NOW from unauthorized access to a telecommunication network is provided in this article. The software product on the basis of Asterisk NOW uses as the server. As softfon and client base laptops, computers, and gadgets on which passes test are considered. Communication of clients with the server passes through a wireless point of WiFi access. The attacking device is the laptop on which the software package of CommView for WiFi is established. By the result of carried out test the analysis of network's vulnerability was made. Recommendations about a measure of protection from unauthorized access are made. The optimum option of network protection is offered.

Для данного заглавия нет комментариев.

оставить комментарий.