00977cam0 2200277 450 E60020003121820201217080754.0887284788520071106d1999 |||||ita|0103 baitaIT<<La >>storia, la politica, le istituzioniScritti sull'antifascismo, sulla storiografia contemporanea e sulle riforme costituzionaliEdgardo SognoSoveria MannelliRubbettino[1999]250 p.21 cmSaggi001SOBE000233012001 *SaggiSogno, EdgardoA600200044495070140018ITUNISOB20201217RICAUNISOBUNISOB90099477E600200031218M 102 Monografia moderna SBNM900003566Si99477acquistopregresso2UNISOBUNISOB20071106102904.020201217080754.0rovitoStoria, la politica, le istituzioni500055UNISOB03706nam 2200613 450 991045089480332120200520144314.01-59693-051-9(CKB)1000000000339662(EBL)286933(OCoLC)437176655(SSID)ssj0000264796(PQKBManifestationID)11201015(PQKBTitleCode)TC0000264796(PQKBWorkID)10291229(PQKB)10838022(MiAaPQ)EBC286933(Au-PeEL)EBL286933(CaPaEBR)ebr10160961(CaBNVSL)mat09101010(IEEE)9101010(EXLCZ)99100000000033966220200729d2006 uy engur|n|---|||||txtccrUnderstanding Voice over IP security /Alan B. Johnston, David M. PiscitelloBoston, Massachusetts :Artech House,©2006.[Piscataqay, New Jersey] :IEEE Xplore,[2006]1 online resource (285 p.)Artech House telecommunications libraryDescription based upon print version of record.1-59693-050-0 Includes bibliographical references and index.Understanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications LibraryThis authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).Publisher abstract.Artech House telecommunications library.Internet telephonySecurity measuresTCP/IP (Computer network protocol)Security measuresElectronic books.Internet telephonySecurity measures.TCP/IP (Computer network protocol)Security measures.005.8Johnston Alan B.523308Piscitello David M972476CaBNVSLCaBNVSLCaBNVSLBOOK9910450894803321Understanding Voice over IP security2211386UNINA01062nam0 22002891i 450 UON0038263820231205104535.166978-88-88700-83-020100622d2007 |0itac50 baitaIT|||| 1||||Mercedes-Benzda alcune lettere a HrabalPawel Huelletraduzione di Raffaella BellettiRomaVoland2007137 p.ill.21 cm.001UON003823762001 Sírin210 RomaVoland35ITRomaUONL000004891.85Letteratura polacca21HUELLEPawelUONV197419704230BELLETTIRaffaellaUONV176053VolandUONV252670650ITSOL20250328RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00382638SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI B 0044 SI EO 45856 5 0044 Mercedes-Benz1357772UNIOR