Cargando…

Securing VoIP networks : threats, vulnerabilities, and countermeasures /

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Thermos, Peter
Otros Autores: Takanen, Ari
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Ch. 1. Introduction
  • Ch. 2. VoIP architectures and protocols
  • Ch. 3. Threats and attacks
  • Ch. 4. VoIP vulnerabilities
  • Ch. 5. Signaling protection mechanisms
  • Ch. 6. Media protection mechanisms
  • Ch. 7. Key management mechanisms
  • Ch. 8. VoIP and network security controls
  • Ch. 9. A security framework for enterprise VoIP networks
  • Ch. 10. Provider architectures and security
  • Ch. 11. Enterprise architectures and security.