The Virtual Bookcase for browsing and sharing reviews of books. New to this site? Read the welcome page first.

The Virtual Bookcase Home
Recent reviews
Collected book news
Welcome to this site

Book details of 'Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures'

Cover of Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
TitleSecuring VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Author(s)Peter Thermos, Ari Takanen
ISBN0321437349
LanguageEnglish
PublishedAugust 2007
PublisherAddison-Wesley Professional
Web links for this book
Search at Bookcrossing.com
Wikipedia booksources
Shop for this book
At Amazon.co.uk
As an Amazon Associate I earn from qualifying purchases


Score:

Vote for this book

The Virtual Bookcase Reviews of 'Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures':

Add my review for Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Book description:

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.   1       Introduction 2       VoIP Architectures and Protocols 3       Threats and Attacks 4       VoIP Vulnerabilites 5       Signaling Protection Mechanisms 6       Media Protection Mechanisms 7       Key Management Mechanisms 8       VoIP and Network Security Controls 9       A Security Framework for Enterprise VoIP Networks 10     Provider Architectures and Security 11     Enterprise Architectures and Security

Search The Virtual Bookcase

Enter a title word, author name or ISBN.

The shelves in The Virtual Bookcase

Arts and architecture (25)
Biography (24)
Business and Management (120)
Cars and driving (53)
Cartoons (45)
Children's books (180)
Computer (475)
Computer history/fun (113)
Computer networks (382)
Computer programming (215)
Computer security (272)
Cook books (89)
Fantasy (154)
Fiction (446)
Health and body (71)
History (138)
Hobby (37)
Horror (65)
Humorous books (52)
Literature (57)
Operating systems (94)
Outdoor camping (162)
Outdoors (236)
Politics (85)
Privacy (61)
Psychology (55)
Religion (17)
Science (113)
Science Fiction (156)
Self-help books (56)
Technology (14)
Travel guides (308)
War and weapons (29)
World Wide Web (213)
Zen (5)
Other books (89)

The Virtual Bookcase is created and maintained by Koos van den Hout. Contact e-mail webmaster@virtualbookcase.com.
Site credits
Copyright © 2000-2020 Koos van den Hout / The Virtual Bookcase Copyright and privacy statement