Cargando…

Understanding Voice over IP security /

This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Johnston, Alan B.
Otros Autores: Piscitello, David M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston, MA : Artech House, ©2006.
Colección:Artech House telecommunications library.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn124063590
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 070508s2006 maua ob 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d SFB  |d OCLCE  |d OCLCQ  |d B24X7  |d OCLCQ  |d NLGGC  |d OCLCO  |d YDXCP  |d OCLCQ  |d MERUC  |d CCO  |d E7B  |d DKDLA  |d FVL  |d OCLCQ  |d AZK  |d MOR  |d OCLCO  |d JBG  |d PIFAG  |d PIFBR  |d OCLCQ  |d LUE  |d BRL  |d STF  |d WRM  |d VTS  |d OCLCA  |d VT2  |d CUY  |d OCLCQ  |d WYU  |d A6Q  |d UKCRE  |d AGLDB  |d EYM  |d INARC  |d IEEEE  |d OCLCQ  |d OCLCO  |d ANO  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBA614590  |2 bnb 
016 7 |a 013380808  |2 Uk 
019 |a 243562154  |a 243595854  |a 473763334  |a 488356640  |a 560358079  |a 607795618  |a 648134258  |a 657552338  |a 722542096  |a 728027192  |a 888806025  |a 961520783  |a 962664952  |a 988464313  |a 992019195  |a 992095715  |a 1037457042  |a 1038634579  |a 1055401652  |a 1064091406  |a 1076287119  |a 1081230052  |a 1153554424  |a 1159064376  |a 1160044151  |a 1181929308  |a 1189801665  |a 1194831524  |a 1228529542  |a 1245905219 
020 |a 9781596930513  |q (electronic bk.) 
020 |a 1596930519  |q (electronic bk.) 
020 |z 1596930500  |q (alk. paper) 
020 |z 9781596930506  |q (alk. paper) 
029 1 |a AU@  |b 000051419707 
029 1 |a AU@  |b 000053225523 
029 1 |a AU@  |b 000053248977 
029 1 |a AU@  |b 000059267728 
029 1 |a AU@  |b 000065667236 
029 1 |a AU@  |b 000069300623 
029 1 |a DEBBG  |b BV043131437 
029 1 |a DEBSZ  |b 422213721 
029 1 |a GBVCP  |b 802280862 
029 1 |a NZ1  |b 12437374 
035 |a (OCoLC)124063590  |z (OCoLC)243562154  |z (OCoLC)243595854  |z (OCoLC)473763334  |z (OCoLC)488356640  |z (OCoLC)560358079  |z (OCoLC)607795618  |z (OCoLC)648134258  |z (OCoLC)657552338  |z (OCoLC)722542096  |z (OCoLC)728027192  |z (OCoLC)888806025  |z (OCoLC)961520783  |z (OCoLC)962664952  |z (OCoLC)988464313  |z (OCoLC)992019195  |z (OCoLC)992095715  |z (OCoLC)1037457042  |z (OCoLC)1038634579  |z (OCoLC)1055401652  |z (OCoLC)1064091406  |z (OCoLC)1076287119  |z (OCoLC)1081230052  |z (OCoLC)1153554424  |z (OCoLC)1159064376  |z (OCoLC)1160044151  |z (OCoLC)1181929308  |z (OCoLC)1189801665  |z (OCoLC)1194831524  |z (OCoLC)1228529542  |z (OCoLC)1245905219 
042 |a dlr 
050 4 |a TK5105.8865  |b .J64 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a ST 205  |2 rvk 
049 |a UAMI 
100 1 |a Johnston, Alan B. 
245 1 0 |a Understanding Voice over IP security /  |c Alan B. Johnston, David M. Piscitello. 
260 |a Boston, MA :  |b Artech House,  |c ©2006. 
300 |a 1 online resource (xvii, 261 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a Artech House telecommunications library 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
506 |3 Use copy  |f Restrictions unspecified  |2 star  |5 MiAaHDL 
533 |a Electronic reproduction.  |b [Place of publication not identified] :  |c HathiTrust Digital Library,  |d 2010.  |5 MiAaHDL 
538 |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.  |u http://purl.oclc.org/DLF/benchrepro0212  |5 MiAaHDL 
583 1 |a digitized  |c 2010  |h HathiTrust Digital Library  |l committed to preserve  |2 pda  |5 MiAaHDL 
520 3 |a This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).  |c Publisher abstract. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Internet telephony  |x Security measures. 
650 0 |a TCP/IP (Computer network protocol)  |x Security measures. 
650 6 |a Téléphonie Internet  |x Sécurité  |x Mesures. 
650 6 |a TCP/IP (Protocole de réseaux d'ordinateurs)  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Internettelefonie  |2 gnd 
700 1 |a Piscitello, David M. 
758 |i has work:  |a Understanding Voice over IP security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGcwR3Pm4TMQcfrKQdq84q  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Johnston, Alan B.  |t Understanding Voice over IP security.  |d Boston, MA : Artech House, ©2006  |z 1596930500  |z 9781596930506  |w (DLC) 2006040691  |w (OCoLC)63136803 
830 0 |a Artech House telecommunications library. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=286933  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00014840 
938 |a ebrary  |b EBRY  |n ebr10160961 
938 |a EBSCOhost  |b EBSC  |n 189834 
938 |a IEEE  |b IEEE  |n 9101010 
938 |a Internet Archive  |b INAR  |n understandingvoi0000john 
938 |a YBP Library Services  |b YANK  |n 2557743 
994 |a 92  |b IZTAP