免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3779 | 回复: 2
打印 上一主题 下一主题

Practical VoIP Security 0603SG [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2006-10-22 23:57 |只看该作者 |倒序浏览
Your Hands-On Guide to Voice over IP (VoIP)\r\n\r\nThis book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions.\r\nVoIP Isn\'t Just Another Data Protocol\r\nIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator\'s point of view, VoIP is different. Understand why.\r\nWhat Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?\r\nFind out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.\r\nThe Security Considerations of Voice Messaging\r\nLearn about the types of security attacks you need to protect against within your voice messaging system.\r\nVoIP and the Public Switched Telephone Network (PSTN)\r\nUnderstand PSTN: what is it, and how does it work?\r\nVoIP Communication Architectures\r\nSee how products like Skype, H.248, IAX, and Microsoft Live Communications Server 2005\r\nThe Support Protocols of VoIP Environments\r\nLearn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.\r\nSecuring the Whole VoIP Infrastructure\r\nYour guide to Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.\r\nAuthorized Access Begins with Authentication\r\nLearn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.\r\nSecure Internet Mail\r\nSee how S/MIME provides cryptographic security services for electronic messaging applications.

论坛徽章:
0
2 [报告]
发表于 2006-10-22 23:57 |只看该作者
Details\r\n\r\nPaperback: 563 pages\r\nPublisher: Syngress Publishing (March 30, 2006)\r\nLanguage: English\r\nISBN: 1597490601

论坛徽章:
0
3 [报告]
发表于 2006-10-23 00:04 |只看该作者
OK!\r\n\r\n文件合并命令如下:\r\n\r\ncopy /b   PVIS00.txt +PVIS01.txt +PVIS02.txt +PVIS03.txt +PVIS04.txt +PVIS05.txt +PVIS06.txt +PVIS07.txt +PVIS08.txt +PVIS09.txt  PVIS.pdf
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP