How to cheat at VoIP security /
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Saved in:
Main Authors: | |
---|---|
Corporate Authors: | |
Group Author: | |
Published: |
Syngress,
|
Publisher Address: | Rockland, Mass. : |
Publication Dates: | 2007. |
Literature type: | eBook |
Language: | English |
Subjects: | |
Online Access: |
http://www.sciencedirect.com/science/book/9781597491693 |
Summary: |
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! |
Carrier Form: | 1 online resource (xx, 412 pages) : illustrations |
Bibliography: | Includes bibliographical references and index. |
ISBN: |
9780080553535 0080553532 |
Index Number: | TK5105 |
CLC: | TN916 |
Contents: | Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. |