Search Books
Innovation Games: Creating … Implementing Lean Software …

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Author Peter Thermos, Ari Takanen
Publisher Addison-Wesley Professional
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
38.49 54.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $1.53

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN0321437349
ISBN-139780321437341
AvailabilityUsually ships in 24 hours
Sales Rank1,872,031
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.

 

1       Introduction

2       VoIP Architectures and Protocols

3       Threats and Attacks

4       VoIP Vulnerabilites

5       Signaling Protection Mechanisms

6       Media Protection Mechanisms

7       Key Management Mechanisms

8       VoIP and Network Security Controls

9       A Security Framework for Enterprise VoIP Networks

10     Provider Architectures and Security

11     Enterprise Architectures and Security

Sams Teach Yourself Android Application Development in…
View
Applied Data Communications: A Business-Oriented Appro…
View
OSPF: Anatomy of an Internet Routing Protocol
View
Web Scalability for Startup Engineers
View
Industrial Electronics
View
MAPLE: A Comprehensive Introduction
View
Guide to the Software Engineering Body of Knowledge (S…
View
Mastering VBA for Microsoft Office 2013
View