LEADER 02963nam 2200625Ia 450 001 9910827388503321 005 20240410100005.0 010 $a1-281-03569-6 010 $a9786611035693 010 $a0-08-048955-9 010 $a1-4237-5774-2 035 $a(CKB)1000000000298107 035 $a(EBL)254830 035 $a(OCoLC)437163434 035 $a(SSID)ssj0000077296 035 $a(PQKBManifestationID)11110354 035 $a(PQKBTitleCode)TC0000077296 035 $a(PQKBWorkID)10031934 035 $a(PQKB)10963700 035 $a(MiAaPQ)EBC254830 035 $a(Au-PeEL)EBL254830 035 $a(CaPaEBR)ebr10115219 035 $a(CaONFJC)MIL103569 035 $a(OCoLC)935230496 035 $a(EXLCZ)991000000000298107 100 $a20040409d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aPractical VoIP Security /$fThomas Porter, et al 205 $a1st ed. 210 $aRockland, MA $cSyngress Publishing$dc2006 215 $a1 online resource (592 p.) 300 $aIncludes index. 311 $a1-59749-060-1 327 $aCover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP 327 $aChapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index 330 $aVoice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network 606 $aInternet telephony$xSecurity measures 606 $aTelecommunication 615 0$aInternet telephony$xSecurity measures. 615 0$aTelecommunication. 676 $a004.62 676 $a005.8 676 $a621.38212 700 $aPorter$b Thomas$01158976 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910827388503321 996 $aPractical VoIP Security$93975912 997 $aUNINA