|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910784058403321 |
|
|
Autore |
Porter Thomas |
|
|
Titolo |
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Rockland, MA, : Syngress Publishing, c2006 |
|
|
|
|
|
|
|
ISBN |
|
1-281-03569-6 |
9786611035693 |
0-08-048955-9 |
1-4237-5774-2 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (592 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Internet telephony - Security measures |
Telecommunication |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP |
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book |
|
|
|
|