top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2006
Disciplina 004.695
Soggetto topico Internet telephony - Management
Internet telephony - Security measures
Telecommunications
Electrical & Computer Engineering
Engineering & Applied Sciences
ISBN 1-5090-9403-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996207695303316
[Place of publication not identified], : IEEE, 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications
The 1st IEEE Workshop on VoIP Management and Security : VoIP MaSe 2006 : securing and managing VoIP communications
Pubbl/distr/stampa [Place of publication not identified], : IEEE, 2006
Disciplina 004.695
Soggetto topico Internet telephony - Management
Internet telephony - Security measures
Telecommunications
Electrical & Computer Engineering
Engineering & Applied Sciences
ISBN 1-5090-9403-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910145626503321
[Place of publication not identified], : IEEE, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Autore Porter Thomas
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (592 p.)
Disciplina 004.62
005.8
Soggetto topico Internet telephony - Security measures
Telecommunication
Soggetto genere / forma Electronic books.
ISBN 1-281-03569-6
9786611035693
0-08-048955-9
1-4237-5774-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index
Record Nr. UNINA-9910451067703321
Porter Thomas  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Autore Porter Thomas
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (592 p.)
Disciplina 004.62
005.8
Soggetto topico Internet telephony - Security measures
Telecommunication
ISBN 1-281-03569-6
9786611035693
0-08-048955-9
1-4237-5774-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index
Record Nr. UNINA-9910784058403321
Porter Thomas  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Practical VoIP Security [[electronic resource] /] / Thomas Porter, et al
Autore Porter Thomas
Edizione [1st ed.]
Pubbl/distr/stampa Rockland, MA, : Syngress Publishing, c2006
Descrizione fisica 1 online resource (592 p.)
Disciplina 004.62
005.8
Soggetto topico Internet telephony - Security measures
Telecommunication
ISBN 1-281-03569-6
9786611035693
0-08-048955-9
1-4237-5774-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Contents; Chapter 1 Introduction to VoIP Security; Chapter 2 Asterisk Configuration and Features; Chapter 3 The Hardware Infrastructure; Chapter 4 PSTN Architecture; Chapter 5 H.323 Architecture; Chapter 6 SIP Architecture; Chapter 7 Other VoIP Communication Architectures; Chapter 8 Support Protocols; Chapter 9 Threats to VoIP Communications Systems; Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP
Chapter 15 Regulatory ComplianceChapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations; Index
Record Nr. UNINA-9910827388503321
Porter Thomas  
Rockland, MA, : Syngress Publishing, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Practical VoIP security [electronic resource] / Thomas Porter ... [et al.].
Practical VoIP security [electronic resource] / Thomas Porter ... [et al.].
Pubbl/distr/stampa Rockland, MA : Syngress Pub.
Descrizione fisica xxviii, 563 p. : ill. ; 23 cm.
Disciplina 621.38212
Altri autori (Persone) Porter, Thomas, PhD.author
Soggetto topico Internet telephony - Security measures
Computer networks - Security measures
Internettelefonie
Soggetto genere / forma Electronic books.
ISBN 9781597490603
1597490601
Formato Risorse elettroniche
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction 2. Architectures 3. Hardware 4. Protocols 5. Support Protocols 6. Protocol Security 7. Threats 8. Solutions Overview 9. Reuse Existing Security Infrastructure Wisely 10. Confirm User Identity 11. Active Security Monitoring 12. Logical Segregation 13. Encryption 14. A Note on Regulatory Compliance 15. Recommendations 17. Appendix A: Access List Guidelines.
Record Nr. UNISALENTO-991003250939707536
Rockland, MA : Syngress Pub.
Risorse elettroniche
Lo trovi qui: Univ. del Salento
Opac: Controlla la disponibilità qui
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Autore Bates Regis J., Bud
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (222 p.)
Disciplina 004.695
Soggetto topico Internet telephony - Security measures
Soggetto genere / forma Electronic books.
ISBN 0-12-417122-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs
Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary
Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start
Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index
Record Nr. UNINA-9910463801603321
Bates Regis J., Bud  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Autore Bates Regis J., Bud
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (222 p.)
Disciplina 004.695
Soggetto topico Internet telephony - Security measures
ISBN 0-12-417122-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs
Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary
Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start
Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index
Record Nr. UNINA-9910787921403321
Bates Regis J., Bud  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Securing VoIP : keeping your VoIP network safe / / Regis J. (Bud) Bates ; acquiring editor, Steve Elliot ; designer, Greg Harris
Autore Bates Regis J., Bud
Edizione [1st edition]
Pubbl/distr/stampa Waltham, Massachusetts : , : Syngress, , 2015
Descrizione fisica 1 online resource (222 p.)
Disciplina 004.695
Soggetto topico Internet telephony - Security measures
ISBN 0-12-417122-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 - Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities
What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 - Policies; What is the problem?; The call control channel - hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 - VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs
Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 - Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 - Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary
Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start
Overview of the RFC 2196Internal issues; Toll fraud - a big threat; Summary; Chapter 8 - Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 - Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index
Record Nr. UNINA-9910807049603321
Bates Regis J., Bud  
Waltham, Massachusetts : , : Syngress, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Understanding Voice over IP security / / Alan B. Johnston, David M. Piscitello
Understanding Voice over IP security / / Alan B. Johnston, David M. Piscitello
Autore Johnston Alan B.
Pubbl/distr/stampa Boston, Massachusetts : , : Artech House, , ©2006
Descrizione fisica 1 online resource (285 p.)
Disciplina 005.8
Altri autori (Persone) PiscitelloDavid M
Collana Artech House telecommunications library
Soggetto topico Internet telephony - Security measures
TCP/IP (Computer network protocol) - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-59693-051-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Understanding Voice over IP Security; Contents; Foreword; Acknowledgments; 1 Introduction 1; 2 Basic Security Concepts: Cryptography 7; 3 VoIP Systems 29; 4 Internet Threats and Attacks 51; 5 Internet Security Architectures 73; 6 Security Protocols 101; 7 General Client and Server Security Principles 121; 8 Authentication 135; 9 Signaling Security 145; 10 Media Security 163; 11 Identity 193; 12 PSTN Gateway Security 225; 13 Spam and Spit 237; 14 Conclusions 247; Index 253; Recent Titles in the Artech House Telecommunications Library
Record Nr. UNINA-9910450894803321
Johnston Alan B.  
Boston, Massachusetts : , : Artech House, , ©2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui