Limit search to available items
Book Cover
E-book
Author Porter, Thomas, PhD.

Title How to cheat at VoIP security / Thomas Porter, Michael Gough
Published Rockland, Mass. : Syngress, ©2007

Copies

Description 1 online resource (xx, 412 pages) : illustrations
Contents Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure
Summary Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Bibliography Includes bibliographical references and index
Subject Internet telephony -- Security measures
Computer networks -- Security measures.
COMPUTERS -- System Administration -- Email Administration.
Computer networks -- Security measures
Form Electronic book
Author Gough, Michael, 1963-
ISBN 9780080553535
0080553532