How to cheat at VoIP security /
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress,
©2007, [2011]
|
Edición: | 1st ed. |
Colección: | "How to cheat--"
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Introduction to VoIP Security
- The hardware infrastructure
- Architectures
- Support Protocols
- Threats to VoIP communications systems
- Confirm user identity
- Active security monitoring
- Logically segregate network traffic
- IETF encryption solutions for VoIP
- Skype security
- Skype firewall and network setup.