語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to cheat at Voip security
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
How to cheat at Voip security/ Thomas Porter, Michael Gough.
作者:
Porter, Thomas,
其他作者:
Gough, Michael,
出版者:
Rockland, MA :Syngress, : c2007.,
面頁冊數:
xx, 412 p. :ill. ; : 24 cm.;
附註:
Includes index.
標題:
Computer networks - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080553535 (electronic bk.)
How to cheat at Voip security
Porter, Thomas,PhD.
How to cheat at Voip security
[electronic resource] /Thomas Porter, Michael Gough. - Rockland, MA :Syngress,c2007. - xx, 412 p. :ill. ;24 cm.
Includes index.
Chapter 1: Introduction to VoIP Security -- Chapter 2: The Hardware Infrastructure -- Chapter 3: Architectures -- Chapter 4: Support Protocols -- Chapter 5: VoIP Threats -- Chapter 6: Confirming User Identity -- Chapter 7: Security Monitoring -- Chapter 8: Segregating Network Traffic -- Chapter 9: VoIP IETF Encryption Solutions -- Chapter 10: Skype Security -- Chapter 11: Skype Firewall Setup -- Appendix A: Sample VoIP Security Policy.
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isnt Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication Architectures Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. * The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. * Securing the Whole VoIP Infrastructure Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. * Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. * Understand Skype Security Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. * Get the Basics of a VoIP Security Policy Use a sample VoIP Security Policy to understand the components of a complete policy. *Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently *Short on theory, history, and technical data that ultimately is not helpful in performing their jobs *Avoid the time drains associated with securing VoIP.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080553535 (electronic bk.)Subjects--Topical Terms:
555385
Computer networks
--Security measures.Index Terms--Genre/Form:
554714
Electronic books.
LC Class. No.: TK5105.8865 / .P67 2007eb
Dewey Class. No.: 621.385
How to cheat at Voip security
LDR
:04039cam a22003014a 4500
001
613827
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
091218s2007 maua s 001 0 eng d
020
$a
9780080553535 (electronic bk.)
020
$a
0080553532 (electronic bk.)
020
$a
9781597491693 (paper)
020
$a
1597491691 (paper)
035
$a
(OCoLC)162131593
035
$a
ocn162131593
040
$a
OPELS
$c
OPELS
$d
OPELS
$d
OCLCQ
050
1 4
$a
TK5105.8865
$b
.P67 2007eb
082
0 4
$a
621.385
$2
22
100
1
$a
Porter, Thomas,
$c
PhD.
$3
641883
245
1 0
$a
How to cheat at Voip security
$h
[electronic resource] /
$c
Thomas Porter, Michael Gough.
260
$a
Rockland, MA :
$c
c2007.
$b
Syngress,
300
$a
xx, 412 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
Chapter 1: Introduction to VoIP Security -- Chapter 2: The Hardware Infrastructure -- Chapter 3: Architectures -- Chapter 4: Support Protocols -- Chapter 5: VoIP Threats -- Chapter 6: Confirming User Identity -- Chapter 7: Security Monitoring -- Chapter 8: Segregating Network Traffic -- Chapter 9: VoIP IETF Encryption Solutions -- Chapter 10: Skype Security -- Chapter 11: Skype Firewall Setup -- Appendix A: Sample VoIP Security Policy.
520
$a
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isnt Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication Architectures Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. * The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. * Securing the Whole VoIP Infrastructure Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. * Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. * Understand Skype Security Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. * Get the Basics of a VoIP Security Policy Use a sample VoIP Security Policy to understand the components of a complete policy. *Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently *Short on theory, history, and technical data that ultimately is not helpful in performing their jobs *Avoid the time drains associated with securing VoIP.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Computer networks
$x
Security measures.
$3
555385
650
0
$a
Internet telephony
$x
Security measures.
$3
641884
655
7
$a
Electronic books.
$2
local
$3
554714
700
1
$a
Gough, Michael,
$d
1963-
$3
641885
710
2
$a
ScienceDirect (Online service)
$3
636041
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491693
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491693
$z
An electronic book accessible through the World Wide Web; click for information
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入