Cargando…

Practical VoIP security /

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Porter, Thomas
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub., ©2006.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Introduction to VoIP security
  • Asterisk configuration and features
  • The hardware infrastructure
  • PSTN architecture
  • H.323 architecture
  • SIP architecture
  • Other VoIP communication architectures
  • Support protocols
  • Threats to VoIP communications systems
  • Validate existing security infrastructure
  • Confirm user identity
  • Active security monitoring
  • Logically segregate network traffic
  • IETF encryption solutions for VoIP
  • Regulatory compliance
  • The IP multimedia subsystem : true converged communications
  • Recommendations.