01295nam a2200301 k 4500001001300000005001500013007001500028008004100043049001700084052002000101086001900121245011500140260007600255300002100331490003800352500002300390500001800413500003500431504004800466533010300514650007400617700004000691710007400731830008200805830005000887830003900937950001700976WMF20041809620201127163937he bmb024bacp 050228s2001 us b 000 eng 0 lAV541630fXA06aC 13.10b800-24 aC 13.10:800-2400aPBX vulnerability analysish[microform]:bfinding holes in your PBX before someone else does/dD. Richard Kuhn a[Washington, D.C.]:bFor sale by the Supt. of Docs., U.S. G.P.O.,c2001 av, 60 p.;c28 cm10aNIST special publication;v800-24 aTitle from caption a"April 2001." aShipping list no.: 2001-0478-M aIncludes bibliographical references (p. 52) aMicrofiche.b[Washington, D.C.]:cSupt. of Doc., U.S. G.P.O.e1 microfiche : negative ; 11 x 15 cm 0aTelephonexPrivate branch exchangesxSecurity measureszUnited States1 aKuhn, D. Richard0KAC2020R88804aut aNational Institute of Standards and Technology (미국)0KAB202010560 0aNIST special publication(For sale by the Supt. of Docs., U.S. G.P.O);v800-24 0aNIST special publication.pComputer security. 0aNIST special publication;v800-24.1 a가격불명