Cargando…

Securing VoIP networks : threats, vulnerabilities, and countermeasures /

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Thermos, Peter
Otros Autores: Takanen, Ari
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn172622934
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 070917s2007 nju ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d TXJ  |d CEF  |d OCLCQ  |d NHM  |d DEBSZ  |d OCLCQ  |d OCLCO  |d CNNAI  |d OCLCQ  |d YDX  |d OCLCQ  |d AU@  |d OCLCQ  |d UAB  |d CNCEN  |d OCLCQ  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OPV 
019 |a 1005465924  |a 1200548236  |a 1200567514  |a 1395744472 
020 |a 9780321437341 
020 |a 0321437349 
020 |a 9780132702300 
020 |a 0132702304 
020 |a 0321524969 
020 |a 9780321524966 
029 1 |a AU@  |b 000067094823 
029 1 |a DEBSZ  |b 355404109 
029 1 |a HEBIS  |b 291476872 
029 1 |a AU@  |b 000074930844 
035 |a (OCoLC)172622934  |z (OCoLC)1005465924  |z (OCoLC)1200548236  |z (OCoLC)1200567514  |z (OCoLC)1395744472 
037 |a CL0500000013  |b Safari Books Online 
050 4 |a TK5105.8865  |b .T44 2007 
082 0 4 |a 621.385 I61 The 2007 [ONLINE] 
049 |a UAMI 
100 1 |a Thermos, Peter. 
245 1 0 |a Securing VoIP networks :  |b threats, vulnerabilities, and countermeasures /  |c Peter Thermos, Ari Takanen. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c 2007. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Ch. 1. Introduction -- Ch. 2. VoIP architectures and protocols -- Ch. 3. Threats and attacks -- Ch. 4. VoIP vulnerabilities -- Ch. 5. Signaling protection mechanisms -- Ch. 6. Media protection mechanisms -- Ch. 7. Key management mechanisms -- Ch. 8. VoIP and network security controls -- Ch. 9. A security framework for enterprise VoIP networks -- Ch. 10. Provider architectures and security -- Ch. 11. Enterprise architectures and security. 
520 |a In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users. 1 Introduction 2 VoIP Architectures and Protocols 3 Threats and Attacks 4 VoIP Vulnerabilites 5 Signaling Protection Mechanisms 6 Media Protection Mechanisms 7 Key Management Mechanisms 8 VoIP and Network Security Controls 9 A Security Framework for Enterprise VoIP Networks 10 Provider Architectures and Security 11 Enterprise Architectures and Security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet telephony  |x Security measures. 
650 6 |a Téléphonie Internet  |x Sécurité  |x Mesures. 
650 7 |a Internet telephony  |x Security measures.  |2 blmlsh 
700 1 |a Takanen, Ari. 
776 0 8 |i Print version:  |a Thermos, Peter.  |t Securing VoIP networks.  |d Upper Saddle River, N.J. : Addison-Wesley, 2007  |z 0321437349  |z 9780321437341  |w (DLC) 2007017689  |w (OCoLC)123955114 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321437341/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Internet Archive  |b INAR  |n securingvoipnetw0000ther 
938 |a YBP Library Services  |b YANK  |n 14858136 
994 |a 92  |b IZTAP