The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004.695 |
Soggetto topico |
Internet telephony - Management
Internet telephony - Security measures Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
ISBN | 1-5090-9403-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996207695303316 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications |
Pubbl/distr/stampa | [Place of publication not identified], : IEEE, 2006 |
Disciplina | 004.695 |
Soggetto topico |
Internet telephony - Management
Internet telephony - Security measures Telecommunications Electrical & Computer Engineering Engineering & Applied Sciences |
ISBN | 1-5090-9403-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910145626503321 |
[Place of publication not identified], : IEEE, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
Autore | Porter Thomas |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (592 p.) |
Disciplina |
004.62
005.8 |
Soggetto topico |
Internet telephony - Security measures
Telecommunication |
Soggetto genere / forma | Electronic books. |
ISBN |
1-281-03569-6
9786611035693 0-08-048955-9 1-4237-5774-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
Record Nr. | UNINA-9910451067703321 |
Porter Thomas | ||
Rockland, MA, : Syngress Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
Autore | Porter Thomas |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (592 p.) |
Disciplina |
004.62
005.8 |
Soggetto topico |
Internet telephony - Security measures
Telecommunication |
ISBN |
1-281-03569-6
9786611035693 0-08-048955-9 1-4237-5774-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
Record Nr. | UNINA-9910784058403321 |
Porter Thomas | ||
Rockland, MA, : Syngress Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al |
Autore | Porter Thomas |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Rockland, MA, : Syngress Publishing, c2006 |
Descrizione fisica | 1 online resource (592 p.) |
Disciplina |
004.62
005.8 |
Soggetto topico |
Internet telephony - Security measures
Telecommunication |
ISBN |
1-281-03569-6
9786611035693 0-08-048955-9 1-4237-5774-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index |
Record Nr. | UNINA-9910827388503321 |
Porter Thomas | ||
Rockland, MA, : Syngress Publishing, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Practical VoIP security [electronic resource] / Thomas Porter ... [et al.]. |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub. |
Descrizione fisica | xxviii, 563 p. : ill. ; 23 cm. |
Disciplina | 621.38212 |
Altri autori (Persone) | Porter, Thomas, PhD.author |
Soggetto topico |
Internet telephony - Security measures
Computer networks - Security measures Internettelefonie |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490603
1597490601 |
Formato | Risorse elettroniche |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction 2. Architectures 3. Hardware 4. Protocols 5. Support Protocols 6. Protocol Security 7. Threats 8. Solutions Overview 9. Reuse Existing Security Infrastructure Wisely 10. Confirm User Identity 11. Active Security Monitoring 12. Logical Segregation 13. Encryption 14. A Note on Regulatory Compliance 15. Recommendations 17. Appendix A: Access List Guidelines. |
Record Nr. | UNISALENTO-991003250939707536 |
Rockland, MA : Syngress Pub. | ||
Risorse elettroniche | ||
Lo trovi qui: Univ. del Salento | ||
|
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910463801603321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910787921403321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris |
Autore | Bates Regis J., Bud |
Edizione | [1st edition] |
Pubbl/distr/stampa | Waltham, Massachusetts : , : Syngress, , 2015 |
Descrizione fisica | 1 online resource (222 p.) |
Disciplina | 004.695 |
Soggetto topico | Internet telephony - Security measures |
ISBN | 0-12-417122-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index |
Record Nr. | UNINA-9910807049603321 |
Bates Regis J., Bud | ||
Waltham, Massachusetts : , : Syngress, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Understanding Voice over IP security / / Alan B. Johnston, David M. Piscitello |
Autore | Johnston Alan B. |
Pubbl/distr/stampa | Boston, Massachusetts : , : Artech House, , ©2006 |
Descrizione fisica | 1 online resource (285 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | PiscitelloDavid M |
Collana | Artech House telecommunications library |
Soggetto topico |
Internet telephony - Security measures
TCP/IP (Computer network protocol) - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 1-59693-051-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Understanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library |
Record Nr. | UNINA-9910450894803321 |
Johnston Alan B. | ||
Boston, Massachusetts : , : Artech House, , ©2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|