Voice over Internet Protocol (VoIP) Security
Elsevier, 2005. gada 19. janv. - 432 lappuses
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.
Lietotāju komentāri - Rakstīt atsauksmi
Ierastajās vietās neesam atraduši nevienu atsauksmi.
Citi izdevumi - Skatīt visu
algorithm allow applications attacker authentication bandwidth bit rate bytes call setup CELP circuit codec communications companies configuration connection data network datagram delay devices dial e-mail encoding encryption endpoint filter firewall Frame Relay functions gatekeeper gateway hackers host identify infrastructure integrity interface internal Internet IP address IP network IP phones IP telephony IPSec jitter kbits/s layer MEGACO MGCP monitor operating system packet password port protection protocol proxy server PSTN public key quantization remote request result Retrieved August Retrieved July risk router routing security profile session Session Initiation Protocol signal sniffers speech spoofed standard switch target techniques telecommunications telephone tion transmission transmitted transport tunnel unauthorized Voice Over IP VoIP VoIP implementation VoIP security VoIP servers VoIP traffic Vonage vulnerabilities wardialing