Securing VoIP Networks
Addison-Wesley Educational Publishers Inc (Verlag)
978-0-321-43734-1 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
1 Introduction
2 VoIP Architectures and Protocols
3 Threats and Attacks
4 VoIP Vulnerabilites
5 Signaling Protection Mechanisms
6 Media Protection Mechanisms
7 Key Management Mechanisms
8 VoIP and Network Security Controls
9 A Security Framework for Enterprise VoIP Networks
10 Provider Architectures and Security
11 Enterprise Architectures and Security
Peter Thermos is CTO of Palindrome Technologies, which provides information security consulting services to government and commercial organizations. Peter started his career at Bellcore (now Telcordia) as a member of the technical staff and later as a principal technical expert on key information security and assurance tasks. He is a frequent speaker at conferences and industry forums including the IEEE, MIS, IEC, ISACA, VON, and others. Peter is also known for his contributions to the security community for discovering software vulnerabilities, the release of SiVuS (The First VoIP Vulnerability Scanner) and the vopsecurity.org Forum. Peter holds a Masters Degree in Computer Science from Columbia University where he is currently furthering his graduate studies. Ari Takanen is founder and CTO of Codenomicon. Since 1998, Ari has focused on information security issues in next-generation networks and security critical environments. He began at Oulu University Secure Programming Group (OUSPG) as a contributing member to PROTOS research that studied information security and reliability errors in WAP, SNMP, LDAP, and VoIP implementations. Ari and his company, Codenomicon Ltd. provide and commercialize automated tools using a systematic approach to test a multitude of interfaces on mission-critical software, VoIP platforms, Internet-routing infrastructure, and 3G devices. Codenomicon and the University of Oulu aim to ensure new technologies are accepted by the general public, by providing means of measuring and ensuring quality in networked software. Ari has been speaking at numerous security and testing conferences on four continents and has been invited to speak at leading universities and international corporations.
Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
Chapter 2: VoIP Architectures and Protocols . . . . . . . . . . . . . . . . . .29
Chapter 3: Threats and Attacks . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
Chapter 4: VoIP Vulnerabilities . . . . . . . . . . . . . . . . . . . . . . . . . . .127
Chapter 5: Signaling Protection Mechanisms . . . . . . . . . . . . . . . . .165
Chapter 6: Media Protection Mechanisms . . . . . . . . . . . . . . . . . . .217
Chapter 7: Key Management Mechanisms . . . . . . . . . . . . . . . . . . .231
Chapter 8: VoIP and Network Security Controls . . . . . . . . . . . . . .263
Chapter 9: A Security Framework for Enterprise VoIP Networks . .297
Chapter 10: Provider Architectures and Security . . . . . . . . . . . . . . .315
Chapter 11: Enterprise Architectures and Security . . . . . . . . . . . . . .334
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .345
Erscheint lt. Verlag | 16.8.2007 |
---|---|
Verlagsort | New Jersey |
Sprache | englisch |
Maße | 178 x 234 mm |
Gewicht | 540 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Technik ► Nachrichtentechnik | |
ISBN-10 | 0-321-43734-9 / 0321437349 |
ISBN-13 | 978-0-321-43734-1 / 9780321437341 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich