𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures

✍ Scribed by Peter Thermos, Ari Takanen


Publisher
Addison-Wesley Professional
Year
2007
Tongue
English
Leaves
384
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.


πŸ“œ SIMILAR VOLUMES


Analyzing Computer Security: A Threat /
✍ Charles P. Pfleeger, Shari Lawrence Pfleeger πŸ“‚ Library πŸ“… 2011 πŸ› Prentice Hall 🌐 English

Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer securityβ€”so you can prevent serious problems and mitigate the effect

Wireless Networks: Cyber Security Threat
✍ Hamid Jahankhani (editor), Ayman El Hajjar (editor) πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NF

Wireless Networks: Cyber Security Threat
✍ Hamid Jahankhani (editor), Ayman El Hajjar (editor) πŸ“‚ Library πŸ“… 2023 πŸ› Springer 🌐 English

<p><span>In recent years, wireless networks communication has become the fundamental basis of our work, leisure, and communication life from the early GSM mobile phones to the Internet of Things and Internet of Everything communications. All wireless communications technologies such as Bluetooth, NF

Improving Web Application Security: Thre
✍ Microsoft Corporation πŸ“‚ Library πŸ“… 2003 πŸ› Microsoft Press 🌐 English

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, a

Ethical Hacking and Countermeasures: Sec
✍ EC-Council πŸ“‚ Library πŸ“… 2009 πŸ› Cengage Learning 🌐 English

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive envir

Microsoft. 2007 Microsoft Office Securit
πŸ“‚ Library 🌐 English

Version<br/>1.0. β€” Microsoft.com, 2007. β€” 265 p.<br/>(Автор Π½Π΅ ΡƒΠΊΠ°Π·Π°Π½).<div class="bb-sep"></div>This guide is a component of the 2007 Microsoft Office Security Guide. It provides detailed vulnerability, countermeasure, and impact information about security-related Group Policy settings for the 2007