How to cheat at VoIP security /
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Call Number: | Libro Electrónico |
---|---|
Main Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, Mass. :
Syngress,
�2007.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.