๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Voice over Internet Protocol (VoIP) Security

โœ Scribed by PhD, CISM, CISSP, James F. Ransome, PhD, CISM, John Rittinghouse


Publisher
Elsevier Digital Press
Year
2005
Tongue
English
Leaves
431
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.


๐Ÿ“œ SIMILAR VOLUMES


Voice over Internet protocol (VoIP) tech
โœ Nortel Networks ๐Ÿ“‚ Library ๐Ÿ“… 2008 ๐Ÿ› Nortel Press ๐ŸŒ English

Your complete guide to Voice over Internet Protocol Looking for a reference on Voice over Internet Protocol (VoIP)? VoIP Technologies, your complete guide to Voice over Internet Protocol (VoIP), provides a comprehensive foundation of VoIP technology, as well as the knowledge necessary to successful

Voice over Internet Protocol (VoIP) Serv
โœ Philip M. Parker ๐Ÿ“‚ Library ๐Ÿ“… 2007 ๐ŸŒ English

The primary audience for this report is managers involved with the highest levels of the strategic planning process and consultants who help their clients with this task. The user will not only benefit from the hundreds of hours that went into the methodology and its application, but also from its a

Hacking Exposed VoIP: Voice Over IP Secu
โœ David Endler, Mark Collier ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› McGraw-Hill Osborne Media ๐ŸŒ English

Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.

VoIP and Unified Communications: Interne
โœ William A. Flanagan ๐Ÿ“‚ Library ๐Ÿ“… 2012 ๐Ÿ› Wiley ๐ŸŒ English

<b>Translates technical jargon into practical business communications solutions</b><p>This book takes readers from traditional voice, fax, video, and data services delivered via separate platforms to a single, unified platform delivering all of these services seamlessly via the Internet. With its cl