LEADER 03706nam 2200613 450 001 9910450894803321 005 20200520144314.0 010 $a1-59693-051-9 035 $a(CKB)1000000000339662 035 $a(EBL)286933 035 $a(OCoLC)437176655 035 $a(SSID)ssj0000264796 035 $a(PQKBManifestationID)11201015 035 $a(PQKBTitleCode)TC0000264796 035 $a(PQKBWorkID)10291229 035 $a(PQKB)10838022 035 $a(MiAaPQ)EBC286933 035 $a(Au-PeEL)EBL286933 035 $a(CaPaEBR)ebr10160961 035 $a(CaBNVSL)mat09101010 035 $a(IEEE)9101010 035 $a(EXLCZ)991000000000339662 100 $a20200729d2006 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUnderstanding Voice over IP security /$fAlan B. Johnston, David M. Piscitello 210 1$aBoston, Massachusetts :$cArtech House,$dİ2006. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2006] 215 $a1 online resource (285 p.) 225 1 $aArtech House telecommunications library 300 $aDescription based upon print version of record. 311 $a1-59693-050-0 320 $aIncludes bibliographical references and index. 327 $aUnderstanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library 330 3 $aThis authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).$cPublisher abstract. 410 0$aArtech House telecommunications library. 606 $aInternet telephony$xSecurity measures 606 $aTCP/IP (Computer network protocol)$xSecurity measures 608 $aElectronic books. 615 0$aInternet telephony$xSecurity measures. 615 0$aTCP/IP (Computer network protocol)$xSecurity measures. 676 $a005.8 700 $aJohnston$b Alan B.$0523308 701 $aPiscitello$b David M$0972476 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910450894803321 996 $aUnderstanding Voice over IP security$92211386 997 $aUNINA