Description |
1 online resource (xx, 412 pages) : illustrations |
|
text file |
Note |
Title from title screen. |
Bibliography |
Includes bibliographical references and index. |
Contents |
Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. |
Summary |
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Internet telephony -- Security measures.
|
|
Internet telephony. |
|
Security systems. |
|
Computer networks -- Security measures.
|
|
Computer networks -- Security measures. |
Genre/Form |
Electronic books.
|
Added Author |
Gough, Michael, 1963- author.
|
Other Form: |
Print version: Porter, Thomas, PhD. How to cheat at VoIP security. Rockland, MA : Syngress, ©2007 9781597491693 1597491691 (DLC) 2007298838 (OCoLC)144227884 |
ISBN |
9780080553535 (electronic book) |
|
0080553532 (electronic book) |
|
9781597491693 |
|
1597491691 |
|