Securing VoIP: Keeping Your VoIP Network Safe
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the busine...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Saint Louis
Elsevier Science
2014
|
Schlagworte: | |
Online-Zugang: | FAW01 |
Zusammenfassung: | Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. Explains the business case for securing VoIP SystemsPresents hands-on tools that show how to defend a VoIP network against attack.Provides detailed case studies and real world examples drawn from the authors' consulting practice.Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.Covers the security policies and procedures that need to be in place to keep VoIP communications safe |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (222 pages) |
ISBN: | 9780124171220 9780124170391 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043613751 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9780124171220 |9 978-0-12-417122-0 | ||
020 | |a 9780124170391 |c Print |9 978-0-12-417039-1 | ||
035 | |a (ZDB-30-PQE)EBC1844194 | ||
035 | |a (ZDB-89-EBL)EBL1844194 | ||
035 | |a (ZDB-38-EBR)ebr10988563 | ||
035 | |a (OCoLC)895660708 | ||
035 | |a (DE-599)BVBBV043613751 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 004.695 | |
100 | 1 | |a (Bud) Bates, Regis J. Jr |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing VoIP |b Keeping Your VoIP Network Safe |
264 | 1 | |a Saint Louis |b Elsevier Science |c 2014 | |
264 | 4 | |c © 2015 | |
300 | |a 1 online resource (222 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. Explains the business case for securing VoIP SystemsPresents hands-on tools that show how to defend a VoIP network against attack.Provides detailed case studies and real world examples drawn from the authors' consulting practice.Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.Covers the security policies and procedures that need to be in place to keep VoIP communications safe | ||
650 | 4 | |a Internet telephony -- Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a (Bud) Bates, Regis J |t Jr. Securing VoIP : Keeping Your VoIP Network Safe |
912 | |a ZDB-30-PQE |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029027810 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9780124170391 |l FAW01 |p ZDB-33-ESD |q FAW_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176357260787712 |
---|---|
any_adam_object | |
author | (Bud) Bates, Regis J. Jr |
author_facet | (Bud) Bates, Regis J. Jr |
author_role | aut |
author_sort | (Bud) Bates, Regis J. Jr |
author_variant | b r j j b brjj brjjb |
building | Verbundindex |
bvnumber | BV043613751 |
collection | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-30-PQE)EBC1844194 (ZDB-89-EBL)EBL1844194 (ZDB-38-EBR)ebr10988563 (OCoLC)895660708 (DE-599)BVBBV043613751 |
dewey-full | 004.695 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.695 |
dewey-search | 004.695 |
dewey-sort | 14.695 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02468nmm a2200397zc 4500</leader><controlfield tag="001">BV043613751</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124171220</subfield><subfield code="9">978-0-12-417122-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124170391</subfield><subfield code="c">Print</subfield><subfield code="9">978-0-12-417039-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1844194</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1844194</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10988563</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)895660708</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043613751</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.695</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">(Bud) Bates, Regis J. Jr</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing VoIP</subfield><subfield code="b">Keeping Your VoIP Network Safe</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Saint Louis</subfield><subfield code="b">Elsevier Science</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (222 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. Explains the business case for securing VoIP SystemsPresents hands-on tools that show how to defend a VoIP network against attack.Provides detailed case studies and real world examples drawn from the authors' consulting practice.Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.Covers the security policies and procedures that need to be in place to keep VoIP communications safe</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet telephony -- Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">(Bud) Bates, Regis J</subfield><subfield code="t">Jr. Securing VoIP : Keeping Your VoIP Network Safe</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029027810</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780124170391</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FAW_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043613751 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:54Z |
institution | BVB |
isbn | 9780124171220 9780124170391 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029027810 |
oclc_num | 895660708 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 online resource (222 pages) |
psigel | ZDB-30-PQE ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FAW_PDA_ESD |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Elsevier Science |
record_format | marc |
spelling | (Bud) Bates, Regis J. Jr Verfasser aut Securing VoIP Keeping Your VoIP Network Safe Saint Louis Elsevier Science 2014 © 2015 1 online resource (222 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping. Explains the business case for securing VoIP SystemsPresents hands-on tools that show how to defend a VoIP network against attack.Provides detailed case studies and real world examples drawn from the authors' consulting practice.Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.Covers the security policies and procedures that need to be in place to keep VoIP communications safe Internet telephony -- Security measures Erscheint auch als Druck-Ausgabe (Bud) Bates, Regis J Jr. Securing VoIP : Keeping Your VoIP Network Safe |
spellingShingle | (Bud) Bates, Regis J. Jr Securing VoIP Keeping Your VoIP Network Safe Internet telephony -- Security measures |
title | Securing VoIP Keeping Your VoIP Network Safe |
title_auth | Securing VoIP Keeping Your VoIP Network Safe |
title_exact_search | Securing VoIP Keeping Your VoIP Network Safe |
title_full | Securing VoIP Keeping Your VoIP Network Safe |
title_fullStr | Securing VoIP Keeping Your VoIP Network Safe |
title_full_unstemmed | Securing VoIP Keeping Your VoIP Network Safe |
title_short | Securing VoIP |
title_sort | securing voip keeping your voip network safe |
title_sub | Keeping Your VoIP Network Safe |
topic | Internet telephony -- Security measures |
topic_facet | Internet telephony -- Security measures |
work_keys_str_mv | AT budbatesregisjjr securingvoipkeepingyourvoipnetworksafe |