VoIP security:
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, impleme...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam Boston
Elsevier
© 2005
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability |
Beschreibung: | Includes bibliographical references (pages 379-384) and index |
Beschreibung: | 1 online resource (xxvii, 402 pages) illustrations |
ISBN: | 9781555583323 1555583326 9780080470467 0080470467 1280964480 9781280964480 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046123365 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2005 |||| o||u| ||||||eng d | ||
020 | |a 9781555583323 |9 978-1-55558-332-3 | ||
020 | |a 1555583326 |9 1-55558-332-6 | ||
020 | |a 9780080470467 |9 978-0-08-047046-7 | ||
020 | |a 0080470467 |9 0-08-047046-7 | ||
020 | |a 1280964480 |9 1-280-96448-0 | ||
020 | |a 9781280964480 |9 978-1-280-96448-0 | ||
035 | |a (ZDB-33-ESD)ocn162130179 | ||
035 | |a (OCoLC)162130179 | ||
035 | |a (DE-599)BVBBV046123365 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Ransome, James F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a VoIP security |c James F. Ransome, John W. Rittinghouse |
264 | 1 | |a Amsterdam |a Boston |b Elsevier |c © 2005 | |
300 | |a 1 online resource (xxvii, 402 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 379-384) and index | ||
520 | |a Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Internet telephony |x Security measures | |
700 | 1 | |a Rittinghouse, John W. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781555583323 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031503818 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781555583323 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180440177704960 |
---|---|
any_adam_object | |
author | Ransome, James F. |
author_facet | Ransome, James F. |
author_role | aut |
author_sort | Ransome, James F. |
author_variant | j f r jf jfr |
building | Verbundindex |
bvnumber | BV046123365 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn162130179 (OCoLC)162130179 (DE-599)BVBBV046123365 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02627nmm a2200445zc 4500</leader><controlfield tag="001">BV046123365</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583323</subfield><subfield code="9">978-1-55558-332-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583326</subfield><subfield code="9">1-55558-332-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080470467</subfield><subfield code="9">978-0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080470467</subfield><subfield code="9">0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280964480</subfield><subfield code="9">1-280-96448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280964480</subfield><subfield code="9">978-1-280-96448-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn162130179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046123365</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VoIP security</subfield><subfield code="c">James F. Ransome, John W. Rittinghouse</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="a">Boston</subfield><subfield code="b">Elsevier</subfield><subfield code="c">© 2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 402 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 379-384) and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781555583323</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031503818</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781555583323</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046123365 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:47Z |
institution | BVB |
isbn | 9781555583323 1555583326 9780080470467 0080470467 1280964480 9781280964480 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031503818 |
oclc_num | 162130179 |
open_access_boolean | |
physical | 1 online resource (xxvii, 402 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier |
record_format | marc |
spelling | Ransome, James F. Verfasser aut VoIP security James F. Ransome, John W. Rittinghouse Amsterdam Boston Elsevier © 2005 1 online resource (xxvii, 402 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (pages 379-384) and index Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures Rittinghouse, John W. Sonstige oth http://www.sciencedirect.com/science/book/9781555583323 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Ransome, James F. VoIP security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures |
title | VoIP security |
title_auth | VoIP security |
title_exact_search | VoIP security |
title_full | VoIP security James F. Ransome, John W. Rittinghouse |
title_fullStr | VoIP security James F. Ransome, John W. Rittinghouse |
title_full_unstemmed | VoIP security James F. Ransome, John W. Rittinghouse |
title_short | VoIP security |
title_sort | voip security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Internet telephony Security measures |
url | http://www.sciencedirect.com/science/book/9781555583323 |
work_keys_str_mv | AT ransomejamesf voipsecurity AT rittinghousejohnw voipsecurity |