Securing VoIP networks : threats, vulnerabilities, and countermeasures /
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspec...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Upper Saddle River, N.J. :
Addison-Wesley,
2007.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Ch. 1. Introduction
- Ch. 2. VoIP architectures and protocols
- Ch. 3. Threats and attacks
- Ch. 4. VoIP vulnerabilities
- Ch. 5. Signaling protection mechanisms
- Ch. 6. Media protection mechanisms
- Ch. 7. Key management mechanisms
- Ch. 8. VoIP and network security controls
- Ch. 9. A security framework for enterprise VoIP networks
- Ch. 10. Provider architectures and security
- Ch. 11. Enterprise architectures and security.