Data and Voice Security - Gregory White, David DiCenso, Dwayne Williams, Travis Good, Kevin Archer

Data and Voice Security

Buch | Softcover
504 Seiten
2001
Sams Publishing (Verlag)
978-0-672-32150-4 (ISBN)
57,65 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This title fills a void in the network security book market by providing clear coverage of issues to which security professionals must respond with the increased convergence of data and telephone networks.
This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security will enable readers to:



Protect data networks from the most common threats.
Learn what security vulnerabilities currently exist in data networks.
Become aware of the threats the telephone network poses to the data network.
Use updated information to protect the data network from the telephone network.
Useful ways to AVOID telephone network intrusions and attacks.
Learn VoIP and the security implications of this transmission technique.

Dr. Gregory White joined SecureLogix in March 1999 where he serves as the Vice President of Professional Services. Before joining SecureLogix he was the Deputy Head of the Computer Science Department and an Associate Professor of Computer Science at the United States Air Force Academy in Colorado Springs, Colorado. While at the Academy, Dr. White was instrumental in the development of two courses on computer security and information warfare and in ensuring that security was taught throughout the computer science curriculum. During his two tours at the Academy, he authored a number of papers on security and information warfare and is a co-author for two textbooks on computer security. He has over 14 years of experience in the security field and wrote his dissertation topic on host- and network-based intrusion detection.

Introduction.


Understanding the Risks.


Understanding Security Basics.


Understanding Networks and TCP/IP.


Understanding Net-Based Attacks.


Understanding the Move Towards Convergence Technology.


Securing Your Data Network from Telco- Based Attacks.


Understanding Total Network Connectivity.


Wardialers & Telephone Line Scanners.


Telephone Firewalls.


Securing Your Voice Assets.


Understanding Telco Basics.


Susceptibility to Tapping.


Maintenance Features and Vulnerabilities.


Administration of a PBX and User Features.


Wireless Security, Voice and Data.


Understanding and Securing Voice Mail Systems.


Securing Voice over Networks and Multimedia Services.


Understanding Voice Over Network (VON) Protocols.


Quality of Service and Implementation Issues.


VON Security.


Multimedia Protocols and Security.


Appendices.


Cryptography.


Viruses and Other Malicious Software.


Sniffing, Spoofing, and Man-in-the Middle Attacks.


Network Scanning.


Password Cracking.


Firewalls.


Monitoring, Logs, and Intrusion Detection Systems.


Broadband Net Access and Security.


Distributed Denial of Service Attack Survivability.


Web Security.


Security and the Law.


Resources.

Erscheint lt. Verlag 20.7.2001
Verlagsort Indianapolis
Sprache englisch
Maße 187 x 231 mm
Gewicht 827 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-672-32150-5 / 0672321505
ISBN-13 978-0-672-32150-4 / 9780672321504
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00