Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
Autore | Porter Thomas |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (592 p.) |
Disciplina |
004.62
005.8 |
Soggetto topico |
Internet telephony - Security measures
Telecommunication |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03569-6
9786611035693 0-08-048955-9 1-4237-5774-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
Record Nr. | UNINA-9910451067703321 |
Porter Thomas | ||
Rockland, MA, : Syngress Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
Autore | Porter Thomas |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (592 p.) |
Disciplina |
004.62
005.8 |
Soggetto topico |
Internet telephony - Security measures
Telecommunication |
ISBN |
1-281-03569-6
9786611035693 0-08-048955-9 1-4237-5774-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
Record Nr. | UNINA-9910784058403321 |
Porter Thomas | ||
Rockland, MA, : Syngress Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|