Data and Voice Security
Sams Publishing (Verlag)
978-0-672-32150-4 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security will enable readers to:
Protect data networks from the most common threats.
Learn what security vulnerabilities currently exist in data networks.
Become aware of the threats the telephone network poses to the data network.
Use updated information to protect the data network from the telephone network.
Useful ways to AVOID telephone network intrusions and attacks.
Learn VoIP and the security implications of this transmission technique.
Dr. Gregory White joined SecureLogix in March 1999 where he serves as the Vice President of Professional Services. Before joining SecureLogix he was the Deputy Head of the Computer Science Department and an Associate Professor of Computer Science at the United States Air Force Academy in Colorado Springs, Colorado. While at the Academy, Dr. White was instrumental in the development of two courses on computer security and information warfare and in ensuring that security was taught throughout the computer science curriculum. During his two tours at the Academy, he authored a number of papers on security and information warfare and is a co-author for two textbooks on computer security. He has over 14 years of experience in the security field and wrote his dissertation topic on host- and network-based intrusion detection.
Introduction.
Understanding the Risks.
Understanding Security Basics.
Understanding Networks and TCP/IP.
Understanding Net-Based Attacks.
Understanding the Move Towards Convergence Technology.
Securing Your Data Network from Telco- Based Attacks.
Understanding Total Network Connectivity.
Wardialers & Telephone Line Scanners.
Telephone Firewalls.
Securing Your Voice Assets.
Understanding Telco Basics.
Susceptibility to Tapping.
Maintenance Features and Vulnerabilities.
Administration of a PBX and User Features.
Wireless Security, Voice and Data.
Understanding and Securing Voice Mail Systems.
Securing Voice over Networks and Multimedia Services.
Understanding Voice Over Network (VON) Protocols.
Quality of Service and Implementation Issues.
VON Security.
Multimedia Protocols and Security.
Appendices.
Cryptography.
Viruses and Other Malicious Software.
Sniffing, Spoofing, and Man-in-the Middle Attacks.
Network Scanning.
Password Cracking.
Firewalls.
Monitoring, Logs, and Intrusion Detection Systems.
Broadband Net Access and Security.
Distributed Denial of Service Attack Survivability.
Web Security.
Security and the Law.
Resources.
Erscheint lt. Verlag | 20.7.2001 |
---|---|
Verlagsort | Indianapolis |
Sprache | englisch |
Maße | 187 x 231 mm |
Gewicht | 827 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-672-32150-5 / 0672321505 |
ISBN-13 | 978-0-672-32150-4 / 9780672321504 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich