59,95 €
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
30 °P sammeln
59,95 €
59,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
30 °P sammeln
Als Download kaufen
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
30 °P sammeln
Jetzt verschenken
59,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
30 °P sammeln
  • Format: PDF

This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks,…mehr

  • Geräte: PC
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 3.85MB
  • FamilySharing(5)
Produktbeschreibung
This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Alan B. Johnston is a distinguished technical member at MCI and an adjunct assistant professor of electrical engineering at Washington University in St. Louis. He holds a B.E.(Hons) in electrical and electronic engineering from the University of Melbourne, Australia and a Ph.D. in electrical engineering from Lehigh University. He is a co-author of the SIP specification RFC 3261 and several other SIP-related RFCs.