Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Porter, Thomas, PhD.

Title How to cheat at VoIP security / Thomas Porter, Michael Gough.

Publication Info. Rockland, Mass. : Syngress, [2007]
©2007

Item Status

Description 1 online resource (xx, 412 pages) : illustrations
text file
Note Title from title screen.
Bibliography Includes bibliographical references and index.
Contents Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
Summary Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Internet telephony -- Security measures.
Internet telephony.
Security systems.
Computer networks -- Security measures.
Computer networks -- Security measures.
Genre/Form Electronic books.
Added Author Gough, Michael, 1963- author.
Other Form: Print version: Porter, Thomas, PhD. How to cheat at VoIP security. Rockland, MA : Syngress, ©2007 9781597491693 1597491691 (DLC) 2007298838 (OCoLC)144227884
ISBN 9780080553535 (electronic book)
0080553532 (electronic book)
9781597491693
1597491691