VoIP security /:
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, impleme...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Elsevier,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability. |
Beschreibung: | 1 online resource (xxvii, 402 pages :) |
Bibliographie: | Includes bibliographical references (pages 379-384) and index. |
ISBN: | 9781555583323 1555583326 9780080470467 0080470467 1280964480 9781280964480 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn162130179 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070802s2005 ne a ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OKU |d OCLCQ |d N$T |d MERUC |d IDEBK |d E7B |d OCLCQ |d YDXCP |d NLE |d OCLCQ |d AGLDB |d OCLCQ |d STF |d D6H |d OCLCQ |d VTS |d OCLCQ |d AU@ |d LEAUB |d M8D |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 123496271 |a 154702812 |a 441774649 |a 648163268 |a 814504976 |a 823139035 |a 859881240 |a 1035648653 |a 1057992731 |a 1108946363 | ||
020 | |a 9781555583323 | ||
020 | |a 1555583326 | ||
020 | |a 9780080470467 |q (electronic bk.) | ||
020 | |a 0080470467 |q (electronic bk.) | ||
020 | |a 1280964480 | ||
020 | |a 9781280964480 | ||
035 | |a (OCoLC)162130179 |z (OCoLC)123496271 |z (OCoLC)154702812 |z (OCoLC)441774649 |z (OCoLC)648163268 |z (OCoLC)814504976 |z (OCoLC)823139035 |z (OCoLC)859881240 |z (OCoLC)1035648653 |z (OCoLC)1057992731 |z (OCoLC)1108946363 | ||
037 | |a 109336:109382 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a TK5105.8865 |b .R36 2005eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a UACD |2 bicssc | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Ransome, James F. |1 https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd |0 http://id.loc.gov/authorities/names/no2004040935 | |
245 | 1 | 0 | |a VoIP security / |c James F. Ransome, John W. Rittinghouse. |
260 | |a Amsterdam ; |a Boston : |b Elsevier, |c ©2005. | ||
300 | |a 1 online resource (xxvii, 402 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references (pages 379-384) and index. | ||
505 | 0 | |a The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. | |
520 | |a Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Internet telephony |x Security measures. | |
650 | 6 | |a Téléphonie Internet |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
700 | 1 | |a Rittinghouse, John W. |1 https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd |0 http://id.loc.gov/authorities/names/n2003002484 | |
758 | |i has work: |a VoIP security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGWgdWMBc8JhqMvVYFb3HC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Ransome, James F. |t VoIP security. |d Amsterdam ; Boston : Elsevier, ©2005 |z 1555583326 |z 9781555583323 |w (DLC) 2004059935 |w (OCoLC)56798966 |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258 |3 Volltext | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583323 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781555583323 |3 Volltext | |
938 | |a ebrary |b EBRY |n ebr10166999 | ||
938 | |a EBSCOhost |b EBSC |n 187258 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 96448 | ||
938 | |a YBP Library Services |b YANK |n 2551311 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn162130179 |
---|---|
_version_ | 1813903302878822400 |
adam_text | |
any_adam_object | |
author | Ransome, James F. |
author2 | Rittinghouse, John W. |
author2_role | |
author2_variant | j w r jw jwr |
author_GND | http://id.loc.gov/authorities/names/no2004040935 http://id.loc.gov/authorities/names/n2003002484 |
author_facet | Ransome, James F. Rittinghouse, John W. |
author_role | |
author_sort | Ransome, James F. |
author_variant | j f r jf jfr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.8865 .R36 2005eb |
callnumber-search | TK5105.8865 .R36 2005eb |
callnumber-sort | TK 45105.8865 R36 42005EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. |
ctrlnum | (OCoLC)162130179 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04283cam a2200613 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn162130179</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070802s2005 ne a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">MERUC</subfield><subfield code="d">IDEBK</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">NLE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AU@</subfield><subfield code="d">LEAUB</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">123496271</subfield><subfield code="a">154702812</subfield><subfield code="a">441774649</subfield><subfield code="a">648163268</subfield><subfield code="a">814504976</subfield><subfield code="a">823139035</subfield><subfield code="a">859881240</subfield><subfield code="a">1035648653</subfield><subfield code="a">1057992731</subfield><subfield code="a">1108946363</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583323</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583326</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080470467</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080470467</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280964480</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280964480</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130179</subfield><subfield code="z">(OCoLC)123496271</subfield><subfield code="z">(OCoLC)154702812</subfield><subfield code="z">(OCoLC)441774649</subfield><subfield code="z">(OCoLC)648163268</subfield><subfield code="z">(OCoLC)814504976</subfield><subfield code="z">(OCoLC)823139035</subfield><subfield code="z">(OCoLC)859881240</subfield><subfield code="z">(OCoLC)1035648653</subfield><subfield code="z">(OCoLC)1057992731</subfield><subfield code="z">(OCoLC)1108946363</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">109336:109382</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.8865</subfield><subfield code="b">.R36 2005eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UACD</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004040935</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VoIP security /</subfield><subfield code="c">James F. Ransome, John W. Rittinghouse.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Elsevier,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxvii, 402 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 379-384) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphonie Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2003002484</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">VoIP security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGWgdWMBc8JhqMvVYFb3HC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ransome, James F.</subfield><subfield code="t">VoIP security.</subfield><subfield code="d">Amsterdam ; Boston : Elsevier, ©2005</subfield><subfield code="z">1555583326</subfield><subfield code="z">9781555583323</subfield><subfield code="w">(DLC) 2004059935</subfield><subfield code="w">(OCoLC)56798966</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583323</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781555583323</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10166999</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">187258</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">96448</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2551311</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn162130179 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:32Z |
institution | BVB |
isbn | 9781555583323 1555583326 9780080470467 0080470467 1280964480 9781280964480 |
language | English |
oclc_num | 162130179 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (xxvii, 402 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier, |
record_format | marc |
spelling | Ransome, James F. https://id.oclc.org/worldcat/entity/E39PCjKk3DMf4WBpqVMgDKjqcd http://id.loc.gov/authorities/names/no2004040935 VoIP security / James F. Ransome, John W. Rittinghouse. Amsterdam ; Boston : Elsevier, ©2005. 1 online resource (xxvii, 402 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references (pages 379-384) and index. The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability. Print version record. Internet telephony Security measures. Téléphonie Internet Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Rittinghouse, John W. https://id.oclc.org/worldcat/entity/E39PCjvpR3xThkGCQv3RVFrwmd http://id.loc.gov/authorities/names/n2003002484 has work: VoIP security (Text) https://id.oclc.org/worldcat/entity/E39PCGWgdWMBc8JhqMvVYFb3HC https://id.oclc.org/worldcat/ontology/hasWork Print version: Ransome, James F. VoIP security. Amsterdam ; Boston : Elsevier, ©2005 1555583326 9781555583323 (DLC) 2004059935 (OCoLC)56798966 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583323 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781555583323 Volltext |
spellingShingle | Ransome, James F. VoIP security / The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. Internet telephony Security measures. Téléphonie Internet Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh |
title | VoIP security / |
title_auth | VoIP security / |
title_exact_search | VoIP security / |
title_full | VoIP security / James F. Ransome, John W. Rittinghouse. |
title_fullStr | VoIP security / James F. Ransome, John W. Rittinghouse. |
title_full_unstemmed | VoIP security / James F. Ransome, John W. Rittinghouse. |
title_short | VoIP security / |
title_sort | voip security |
topic | Internet telephony Security measures. Téléphonie Internet Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh |
topic_facet | Internet telephony Security measures. Téléphonie Internet Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=187258 https://www.sciencedirect.com/science/book/9781555583323 |
work_keys_str_mv | AT ransomejamesf voipsecurity AT rittinghousejohnw voipsecurity |