Vai al contenuto principale della pagina

Understanding Voice over IP security / / Alan B. Johnston, David M. Piscitello



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Johnston Alan B. Visualizza persona
Titolo: Understanding Voice over IP security / / Alan B. Johnston, David M. Piscitello Visualizza cluster
Pubblicazione: Boston, Massachusetts : , : Artech House, , ©2006
[Piscataqay, New Jersey] : , : IEEE Xplore, , [2006]
Descrizione fisica: 1 online resource (285 p.)
Disciplina: 005.8
Soggetto topico: Internet telephony - Security measures
TCP/IP (Computer network protocol) - Security measures
Altri autori: PiscitelloDavid M  
Note generali: Description based upon print version of record.
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Understanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library
Sommario/riassunto: This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).
Titolo autorizzato: Understanding Voice over IP security  Visualizza cluster
ISBN: 1-59693-051-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910809638103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Artech House telecommunications library.