How to cheat at VoIP security /

Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!

Saved in:
Bibliographic Details
Main Authors: Porter, Thomas, PhD
Corporate Authors: Elsevier Science & Technology
Group Author: Gough, Michael, 1963
Published: Syngress,
Publisher Address: Rockland, Mass. :
Publication Dates: 2007.
Literature type: eBook
Language: English
Subjects:
Online Access: http://www.sciencedirect.com/science/book/9781597491693
Summary: Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Carrier Form: 1 online resource (xx, 412 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9780080553535
0080553532
Index Number: TK5105
CLC: TN916
Contents: Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.