This page contains enriched content visible when JavaScript is enabled.
My Account
Library Home
Your session will expire automatically in
0
seconds.
Continue session
End session now
Save to My Lists
Export
Return to Browse
SearchType
Keyword
Title
Author (Last name first)
Subject
ISBN/ISSN
Call Number
Unit Code
Libraries Australia No.
Library of Congress No.
Search
Search Scope
Entire Collection
Print Books
E-books
All books
E-journals
All journals
Databases
All e-resources
Streaming Video
DVDs
Curriculum Resources
Deakin Theses
Special Collections
Melbourne Burwood
Warrnambool
Geelong Waterfront
Geelong Waurn Ponds
Limit search to available items
Previous Record
Next Record
  Permalink    
Author
Porter, Thomas, PhD.
Title
How to cheat at VoIP security / Thomas Porter, Michael Gough
Published
Rockland, Mass. : Syngress, ©2007
Click on the following:
EBSCO eBooks
Copies
Description
1 online resource (xx, 412 pages) : illustrations
Contents
Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure
Summary
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Bibliography
Includes bibliographical references and index
Subject
Internet telephony -- Security measures
Computer networks -- Security measures.
COMPUTERS -- System Administration -- Email Administration.
Computer networks -- Security measures
Form
Electronic book
Author
Gough, Michael, 1963-
ISBN
9780080553535
0080553532
  Permalink