Welcome to the Kids' Library!
Search for books, movies, music, magazines, and more.
Your session will expire automatically in
0
seconds.
Continue session
End session now
Back to Search Results
SearchType
Keyword
Author
Title
Subject
Call Number
Search
Search Scope
PSU Library Consortium
Pittsburg State University
Academic Libraries
Public Libraries
Pittsburg Area
Unified School District
Leonard H. Axe Library
Career Resource Center Library
Eureka Public Library
Fort Scott Community College Library
George Nettels Elementary School Library
Kansas Technology Center Library
Lakeside Elementary School Library
Meadowlark Elementary School Library
Parsons Public Library
Pittsburg Community Middle School Library
Pittsburg High School Library
Pittsburg Public Library
Sedan Public Library
Westside Elementary School Library
Childrens Collection
Available items only
Previous Record
Next Record
Author
Porter, Thomas, PhD.
Title
How to cheat at VoIP security / Thomas Porter, Michael Gough.
Imprint
Rockland, Mass. : Syngress, ©2007.
Connect to
Available to Pittsburg State University patrons only.
Copies
Location
Call No.
OPAC Message
Status
Axe Elsevier ScienceDirect Ebook
Electronic Book
---
Available
Description
1 online resource (xx, 412 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Bibliography
Includes bibliographical references and index.
Contents
Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
Summary
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Subject
Internet telephony -- Security measures.
Computer networks -- Security measures.
Téléphonie Internet -- Sécurité -- Mesures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
COMPUTERS -- System Administration -- Email Administration.
Computer networks -- Security measures
Added Author
Gough, Michael, 1963- Author.
Other Form:
Print version: Porter, Thomas, PhD. How to cheat at VoIP security. Rockland, MA : Syngress, ©2007 9781597491693 1597491691 (DLC) 2007298838 (OCoLC)144227884
ISBN
9780080553535 (electronic bk.)
0080553532 (electronic bk.)
9781597491693
1597491691
Standard No.
AU@ 000051562433
AU@ 000051859866
AU@ 000053251910
CHNEW 001007844
DEBBG BV042314184
DEBBG BV043160019
DEBSZ 405306016
DEBSZ 422164291
GBVCP 80275404X
NZ1 11778384
NZ1 15189234
UKMGB 017548962
AU@ 000069007643
Available items only