Loading…

Securing VoIP networks : threats, vulnerabilities, and countermeasures /

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspec...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Thermos, Peter
Other Authors: Takanen, Ari
Format: Electronic eBook
Language:Inglés
Published: Upper Saddle River, N.J. : Addison-Wesley, 2007.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Ch. 1. Introduction
  • Ch. 2. VoIP architectures and protocols
  • Ch. 3. Threats and attacks
  • Ch. 4. VoIP vulnerabilities
  • Ch. 5. Signaling protection mechanisms
  • Ch. 6. Media protection mechanisms
  • Ch. 7. Key management mechanisms
  • Ch. 8. VoIP and network security controls
  • Ch. 9. A security framework for enterprise VoIP networks
  • Ch. 10. Provider architectures and security
  • Ch. 11. Enterprise architectures and security.