Cargando…

Practical VoIP security /

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Porter, Thomas
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress Pub., �2006.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 SCIDIR_ocm64668662
003 OCoLC
005 20231117015030.0
006 m o d
007 cr cnu---unuuu
008 060314s2006 mau o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d TUU  |d OCLCQ  |d B24X7  |d OPELS  |d OKU  |d MERUC  |d CCO  |d E7B  |d UMI  |d BAKER  |d TXJ  |d CEF  |d DKDLA  |d ZCU  |d DEBSZ  |d FVL  |d OCLCQ  |d OVY  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d YDX  |d AGLDB  |d COCUF  |d CNNOR  |d MOR  |d PIFBR  |d LIV  |d OCLCQ  |d JBG  |d WY@  |d LUE  |d OCLCF  |d STF  |d BRL  |d WRM  |d D6H  |d WCO  |d OCLCQ  |d VTS  |d OCLCQ  |d INT  |d OCLCQ  |d WYU  |d A6Q  |d VT2  |d OCLCQ  |d LEAUB  |d M8D  |d OCLCQ  |d K6U  |d UKCRE  |d OCLCQ  |d BRF  |d INARC  |d OCLCO  |d OCLCQ  |d QGK  |d COA  |d OCLCO 
019 |a 71666552  |a 76898842  |a 162597494  |a 473842690  |a 475306571  |a 507458164  |a 560152994  |a 647476938  |a 722443217  |a 728035309  |a 759520633  |a 856952374  |a 888730319  |a 961555234  |a 962574081  |a 988523356  |a 991988036  |a 1035696979  |a 1037508568  |a 1038694057  |a 1076286636  |a 1081222633  |a 1097157015  |a 1153532158  |a 1228537545  |a 1259120344  |a 1340055944 
020 |a 1423757742  |q (electronic bk.) 
020 |a 9781423757740  |q (electronic bk.) 
020 |a 9781597490603 
020 |a 1597490601 
020 |a 1281035696 
020 |a 9781281035691 
020 |a 9786611035693 
020 |a 6611035699 
020 |a 0080489559 
020 |a 9780080489551 
024 1 |a 792502906019 
024 8 |a (WaSeSS)ssj0000077296 
035 |a (OCoLC)64668662  |z (OCoLC)71666552  |z (OCoLC)76898842  |z (OCoLC)162597494  |z (OCoLC)473842690  |z (OCoLC)475306571  |z (OCoLC)507458164  |z (OCoLC)560152994  |z (OCoLC)647476938  |z (OCoLC)722443217  |z (OCoLC)728035309  |z (OCoLC)759520633  |z (OCoLC)856952374  |z (OCoLC)888730319  |z (OCoLC)961555234  |z (OCoLC)962574081  |z (OCoLC)988523356  |z (OCoLC)991988036  |z (OCoLC)1035696979  |z (OCoLC)1037508568  |z (OCoLC)1038694057  |z (OCoLC)1076286636  |z (OCoLC)1081222633  |z (OCoLC)1097157015  |z (OCoLC)1153532158  |z (OCoLC)1228537545  |z (OCoLC)1259120344  |z (OCoLC)1340055944 
050 4 |a TK5105.8865  |b P73 2006eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
245 0 0 |a Practical VoIP security /  |c Thomas Porter [and others]. 
260 |a Rockland, MA :  |b Syngress Pub.,  |c �2006. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
505 0 |a Introduction to VoIP security -- Asterisk configuration and features -- The hardware infrastructure -- PSTN architecture -- H.323 architecture -- SIP architecture -- Other VoIP communication architectures -- Support protocols -- Threats to VoIP communications systems -- Validate existing security infrastructure -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Regulatory compliance -- The IP multimedia subsystem : true converged communications -- Recommendations. 
520 |a Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive More VoIP phone lines are being installed every day than traditional PBX phone lines VoIP is vulnerable to the same range of attacks of any network device VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities. 
546 |a English. 
650 0 |a Internet telephony  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a T�el�ephonie Internet  |0 (CaQQLa)201-0312636  |x S�ecurit�e  |0 (CaQQLa)201-0373949  |x Mesures.  |0 (CaQQLa)201-0373949 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 1 7 |a Internettelefonie.  |2 gtt 
700 1 |a Porter, Thomas. 
776 0 8 |i Print version:  |t Practical VoIP security.  |d Rockland, MA : Syngress Pub. ; [Sebastopol, Calif.] : Distributed by O'Reilly Media, �2006  |z 1597490601  |z 9781597490603  |w (OCoLC)66279406 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9781597490603  |z Texto completo