How to cheat at VoIP security:
Saved in:
Bibliographic Details
Main Author: Porter, Thomas, PhD (Author)
Format: Electronic eBook
Language:English
Published: Rockland, Mass. Syngress c2007
Subjects:
Online Access:FAW01
FAW02
Volltext
Item Description:Title from title screen
Includes bibliographical references and index
Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Physical Description:1 Online-Ressource (xx, 412 p.)
ISBN:0080553532
1597491691
9780080553535
9781597491693

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection! Get full text