Practical VoIP security /
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress Pub.,
©2006.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Introduction to VoIP security
- Asterisk configuration and features
- The hardware infrastructure
- PSTN architecture
- H.323 architecture
- SIP architecture
- Other VoIP communication architectures
- Support protocols
- Threats to VoIP communications systems
- Validate existing security infrastructure
- Confirm user identity
- Active security monitoring
- Logically segregate network traffic
- IETF encryption solutions for VoIP
- Regulatory compliance
- The IP multimedia subsystem : true converged communications
- Recommendations.