How to cheat at VoIP security. (©2007)
- Record Type:
- Book
- Title:
- How to cheat at VoIP security. (©2007)
- Main Title:
- How to cheat at VoIP security
- Further Information:
- Note: Thomas Porter, Michael Gough.
- Other Names:
- PhD, Porter, Thomas
Gough, Michael, 1963- - Contents:
- Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
- Publisher Details:
- Rockland, Mass : Syngress
- Publication Date:
- 2007
- Copyright Date:
- 2007
- Extent:
- 1 online resource (xx, 412 pages), illustrations
- Subjects:
- 004.69
Internet telephony -- Security measures
Computer networks -- Security measures
Internet telephony -- Security measures
Computer networks -- Security measures
COMPUTERS -- System Administration -- Email Administration
Electronic books - Languages:
- English
- ISBNs:
- 9780080553535
0080553532 - Related ISBNs:
- 9781597491693
1597491691 - Notes:
- Note: Includes bibliographical references and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.29596
- Ingest File:
- 02_061.xml