Thursday, July 21, 2016

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures by Peter Thermos *Books Online »DOC

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists.In Securing VoIP Net

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Title:Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Author:Peter Thermos
Rating:4.64 (330 Votes)
Asin:0321437349
Format Type:Paperback
Number of Pages:384 Pages
Publish Date:2007-08-11
Genre:

Editorial : From the Back Cover In" Securing VoIP Networks, "two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and

Incidentally, from wide reading the consensus seems to be that Smith was most likely a deist , though Skousen does his utmost to claim him for a down the line Christian despite very little primary sources to make that claim. This book was a very good biography on Kenney and provided a lot of interesting background, anecdotes and legendary stories about the man and his artistic endeavors. None were tougher and more determined than Harrington.
Everything in turn-of-the-century California was changing at a breathtaking pace. As organizations race to deploy VoIP and experience the benefits, most would probably benefit from slowing down to consider the security implications and develop appropriate controls to protect their communications.

In Security VoIP Networks: Threats, Vulnerabilities, and Countermeasures, authors Peter Thermos and Ari Takanen do a superb job of illustrating the insecurities of VoIP. Boulud allows the author pretty much free access to the internal worki

No comments:

Post a Comment