LEADER 03706nam 2200613 450 001 9910450894803321 005 20200520144314.0 010 $a1-59693-051-9 035 $a(CKB)1000000000339662 035 $a(EBL)286933 035 $a(OCoLC)437176655 035 $a(SSID)ssj0000264796 035 $a(PQKBManifestationID)11201015 035 $a(PQKBTitleCode)TC0000264796 035 $a(PQKBWorkID)10291229 035 $a(PQKB)10838022 035 $a(MiAaPQ)EBC286933 035 $a(Au-PeEL)EBL286933 035 $a(CaPaEBR)ebr10160961 035 $a(CaBNVSL)mat09101010 035 $a(IEEE)9101010 035 $a(EXLCZ)991000000000339662 100 $a20200729d2006 uy 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aUnderstanding Voice over IP security /$fAlan B. Johnston, David M. Piscitello 210 1$aBoston, Massachusetts :$cArtech House,$dİ2006. 210 2$a[Piscataqay, New Jersey] :$cIEEE Xplore,$d[2006] 215 $a1 online resource (285 p.) 225 1 $aArtech House telecommunications library 300 $aDescription based upon print version of record. 311 $a1-59693-050-0 320 $aIncludes bibliographical references and index. 327 $aUnderstanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library 330 3 $aThis authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).$cPublisher abstract. 410 0$aArtech House telecommunications library. 606 $aInternet telephony$xSecurity measures 606 $aTCP/IP (Computer network protocol)$xSecurity measures 608 $aElectronic books. 615 0$aInternet telephony$xSecurity measures. 615 0$aTCP/IP (Computer network protocol)$xSecurity measures. 676 $a005.8 700 $aJohnston$b Alan B.$0523308 701 $aPiscitello$b David M$0972476 801 0$bCaBNVSL 801 1$bCaBNVSL 801 2$bCaBNVSL 906 $aBOOK 912 $a9910450894803321 996 $aUnderstanding Voice over IP security$92211386 997 $aUNINA LEADER 03441nam 22007333u 450 001 9910783847303321 005 20230126203901.0 010 $a1-134-46406-1 010 $a1-280-14318-5 010 $a0-203-99539-2 035 $a(CKB)1000000000253664 035 $a(EBL)240608 035 $a(OCoLC)475954626 035 $a(SSID)ssj0000365785 035 $a(PQKBManifestationID)12080274 035 $a(PQKBTitleCode)TC0000365785 035 $a(PQKBWorkID)10413863 035 $a(PQKB)11097775 035 $a(SSID)ssj0000244839 035 $a(PQKBManifestationID)11235710 035 $a(PQKBTitleCode)TC0000244839 035 $a(PQKBWorkID)10176292 035 $a(PQKB)11512080 035 $a(MiAaPQ)EBC240608 035 $a(EXLCZ)991000000000253664 100 $a20130418d2012|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSexuality, Gender and Schooling$b[electronic resource] $eShifting Agendas in Social Learning 210 $aHoboken $cTaylor and Francis$d2012 215 $a1 online resource (201 p.) 300 $aDescription based upon print version of record. 311 $a0-415-28047-8 311 $a0-415-28046-X 327 $aSexuality, Gender and Schooling Shifting agendas in social learning; Copyright; Contents; Acknowledgements; Foreword; Introduction; Chapter 1 Fragments from a fading career: personal narratives and emotional investments; Chapter 2 Ways of conceptualising sexuality, gender and schooling; Chapter 3 Producing heterosexualities: the school as a site of discursive practices; Chapter 4 Agony aunts and absences: an analysis of a sex education class; Chapter 5 More Sugar? Teenage magazines, gender displays and sexual learning 327 $aChapter 6 Understanding masculinities: young men, heterosexuality and embodimentChapter 7 Sexing the subject: teachers, pedagogies and sex education; Chapter 8 Sexuality, gender and schooling reconsidered: notes towards a conclusion; Notes; Appendix; Bibliography; Index 330 $aThe sexuality of young people arouses controversy and remains a source of concern for parents, teachers, policy-makers and politicians. But what young people really think about sexuality and gender and how these issues impact upon their lives is often marginalized or overlooked.Based upon extensive ethnographic research with young people and teachers, Sexuality, Gender and Schooling offers a telling and insightful account of how young people acquire sexual knowledge and how they enact their understanding of their own gender. It highlights the ways in which young people's con 606 $aSex (Psychology) 606 $aSex instruction 606 $aSex instruction 606 $aYouth 606 $aGender & Ethnic Studies$2HILCC 606 $aSocial Sciences$2HILCC 606 $aGender Studies & Sexuality$2HILCC 615 4$aSex (Psychology). 615 4$aSex instruction. 615 4$aSex instruction. 615 4$aYouth. 615 7$aGender & Ethnic Studies 615 7$aSocial Sciences 615 7$aGender Studies & Sexuality 676 $a306.7071 676 $a371.714 700 $aKehily$b Mary Jane$01519171 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910783847303321 996 $aSexuality, Gender and Schooling$93797660 997 $aUNINA