La Poste Autrichienne 5.99 Coursier DPD 6.49 Service de messagerie GLS 4.49

How to Cheat at VoIP Security

Langue AnglaisAnglais
Livre Livre de poche
Livre How to Cheat at VoIP Security Michael Gough
Code Libristo: 04832006
Éditeurs Syngress Media,U.S., mai 2007
This is the perfect reference for the multitasked sys admin. It is the perfect guide if VoIP enginee... Description détaillée
? points 177 b
75.03 včetně DPH
Stockage externe Expédition sous 15-20 jours
Autriche common.delivery_to

Politique de retour sous 30 jours


Ceci pourrait également vous intéresser


Future Is History Masha Gessen / Livre de poche
common.buy 11.76
Shadow Of The Fox Julie Kagawa / Livre de poche
common.buy 13.58
Intermediate Cambodian Reader Franklin E. Huffman / Livre de poche
common.buy 43.13
Voice over Internet Protocol (VoIP) Security John Rittinghouse / Livre de poche
common.buy 101.47
Japan's Economic Revival D. Citrin / Livre relié
common.buy 152.31
Practical VoIP Security Thomas Porter / Livre de poche
common.buy 72.24
Computer Ethics Tom Forester / Livre de poche
common.buy 55.12
Rethinking Intellectual History Dominick LaCapra / Livre de poche
common.buy 32.42

This is the perfect reference for the multitasked sys admin. It is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. VoIP isn't just another data protocol. IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Understand why. What functionality is gained, degraded, or enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. This title features the security considerations of voice messaging. Learn about the types of security attacks you need to protect against within your voice messaging system. Understand the VoIP communication architectures. Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. It also features the support protocols of VoIP environments. Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. The title features securing the whole VoIP infrastructure. Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. Authorized access begins with authentication. Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. Understand skype security. Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. Get the basics of a VoIP security policy. Use a sample VoIP Security Policy to understand the components of a complete policy. This title provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently. Short on theory, history, and technical data that ultimately is not helpful in performing their jobs. Avoid the time drains associated with securing VoIP.

Offrez ce livre dès aujourd'hui
C’est simple
1 Ajouter au panier et choisir l'option Livrer comme cadeau à la caisse. 2 Nous vous enverrons un bon d'achat 3 Le livre arrivera à l'adresse du destinataire

Connexion

Connectez-vous à votre compte. Vous n'avez pas encore de compte Libristo ? Créez-en un maintenant !

 
Obligatoire
Obligatoire

Vous n'avez pas encore de compte ? Découvrez les avantages d’avoir un compte Libristo !

Avec un compte Libristo, vous aurez tout sous contrôle.

Créer un compte Libristo