Language:
繁體中文
English
日文
說明(常見問題)
南開科技大學
圖書館首頁
編目中圖書申請
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
How to cheat at Voip security
紀錄類型:
書目-電子資源 : 單行本
正題名/作者:
How to cheat at Voip security/ Thomas Porter, Michael Gough.
作者:
Porter, Thomas,
其他作者:
Gough, Michael,
出版者:
Rockland, MA :Syngress,c2007.
面頁冊數:
xx, 412 p. :ill. ;24 cm.
附註:
Includes index.
標題:
Internet telephony - Security measures. -
電子資源:
An electronic book accessible through the World Wide Web; click for information
電子資源:
An electronic book accessible through the World Wide Web; click for information
ISBN:
9780080553535 (electronic bk.)
ISBN:
0080553532 (electronic bk.)
ISBN:
9781597491693 (paper)
ISBN:
1597491691 (paper)
How to cheat at Voip security
Porter, Thomas,PhD.
How to cheat at Voip security
[electronic resource] /Thomas Porter, Michael Gough. - Rockland, MA :Syngress,c2007. - xx, 412 p. :ill. ;24 cm.
Includes index.
Chapter 1: Introduction to VoIP Security -- Chapter 2: The Hardware Infrastructure -- Chapter 3: Architectures -- Chapter 4: Support Protocols -- Chapter 5: VoIP Threats -- Chapter 6: Confirming User Identity -- Chapter 7: Security Monitoring -- Chapter 8: Segregating Network Traffic -- Chapter 9: VoIP IETF Encryption Solutions -- Chapter 10: Skype Security -- Chapter 11: Skype Firewall Setup -- Appendix A: Sample VoIP Security Policy.
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isnt Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication Architectures Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. * The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. * Securing the Whole VoIP Infrastructure Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. * Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. * Understand Skype Security Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. * Get the Basics of a VoIP Security Policy Use a sample VoIP Security Policy to understand the components of a complete policy. *Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently *Short on theory, history, and technical data that ultimately is not helpful in performing their jobs *Avoid the time drains associated with securing VoIP.
Electronic reproduction.
Amsterdam :
Elsevier Science & Technology,
2007.
Mode of access: World Wide Web.
ISBN: 9780080553535 (electronic bk.)Subjects--Topical Terms:
1000060485
Internet telephony
--Security measures.Index Terms--Genre/Form:
172687
Electronic books.
LC Class. No.: TK5105.8865 / .P67 2007eb
Dewey Class. No.: 621.385
How to cheat at Voip security
LDR
:04054cmm 22003014a 4500
001
1000045976
003
OCoLC
005
20091026094528.0
006
m d
007
cr cn
008
070802s2007 maua s 001 0 eng d
020
$a
9780080553535 (electronic bk.)
020
$a
0080553532 (electronic bk.)
020
$a
9781597491693 (paper)
020
$a
1597491691 (paper)
035
$a
(OCoLC)162131593
035
$a
ocn162131593
040
$a
OPELS
$c
OPELS
$d
OPELS
$d
OCLCQ
050
1 4
$a
TK5105.8865
$b
.P67 2007eb
082
0 4
$a
621.385
$2
22{me_controlnum}
100
1
$a
Porter, Thomas,
$c
PhD.
$3
1000060483
245
1 0
$a
How to cheat at Voip security
$h
[electronic resource] /
$c
Thomas Porter, Michael Gough.
260
$a
Rockland, MA :
$b
Syngress,
$c
c2007.
300
$a
xx, 412 p. :
$b
ill. ;
$c
24 cm.
500
$a
Includes index.
505
0
$a
Chapter 1: Introduction to VoIP Security -- Chapter 2: The Hardware Infrastructure -- Chapter 3: Architectures -- Chapter 4: Support Protocols -- Chapter 5: VoIP Threats -- Chapter 6: Confirming User Identity -- Chapter 7: Security Monitoring -- Chapter 8: Segregating Network Traffic -- Chapter 9: VoIP IETF Encryption Solutions -- Chapter 10: Skype Security -- Chapter 11: Skype Firewall Setup -- Appendix A: Sample VoIP Security Policy.
520
$a
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isnt Just Another Data Protocol IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrators point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network? Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP. * The Security Considerations of Voice Messaging Learn about the types of security attacks you need to protect against within your voice messaging system. * Understand the VoIP Communication Architectures Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features. * The Support Protocols of VoIP Environments Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY. * Securing the Whole VoIP Infrastructure Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks. * Authorized Access Begins with Authentication Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network. * Understand Skype Security Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection. * Get the Basics of a VoIP Security Policy Use a sample VoIP Security Policy to understand the components of a complete policy. *Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently *Short on theory, history, and technical data that ultimately is not helpful in performing their jobs *Avoid the time drains associated with securing VoIP.
533
$a
Electronic reproduction.
$b
Amsterdam :
$c
Elsevier Science & Technology,
$d
2007.
$n
Mode of access: World Wide Web.
$n
System requirements: Web browser.
$n
Title from title screen (viewed on July 25, 2007).
$n
Access may be restricted to users at subscribing institutions.
650
0
$a
Internet telephony
$x
Security measures.
$3
1000060485
650
0
$a
Computer networks
$x
Security measures.
$3
146868
655
7
$a
Electronic books.
$2
local.
$3
172687
700
1
$a
Gough, Michael,
$d
1963-
$3
1000060484
710
2
$a
ScienceDirect (Online service)
$3
1000060142
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597491693
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491693
$z
An electronic book accessible through the World Wide Web; click for information
0 筆讀者評論
館藏地:
全部
線上資料庫 (Online Resource)
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約人數
備註欄
附件
OE0040133
線上資料庫 (Online Resource)
線上資源
線上電子書
OE
一般(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
建立或儲存個人書籤
書目轉出
取書館別
處理中
...
變更密碼
登入