Login / Signup
Hacking the House Chapter 2: The Boston VoIP doorbell.
Stuart Lipoff
Published in:
IEEE Consumer Electron. Mag. (2016)
Keyphrases
</>
chapter presents
case study
intelligence and security informatics
quality of service
packet loss
security threats
table of contents
pros and cons
ip networks
penetration testing
chapter introduces
search computing
real time
cutting edge
implementation issues
book covers
information sharing
neural network