How to cheat at VoIP security /
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, MA :
Syngress,
©2007, [2011]
|
Edition: | 1st ed. |
Series: | "How to cheat--"
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Introduction to VoIP Security
- The hardware infrastructure
- Architectures
- Support Protocols
- Threats to VoIP communications systems
- Confirm user identity
- Active security monitoring
- Logically segregate network traffic
- IETF encryption solutions for VoIP
- Skype security
- Skype firewall and network setup.