Securing VoIP Networks Threats Vulnerabilities Countermeasures 1st Edition by Peter Thermos, Ari Takanen – Ebook PDF Instant Download/Delivery: 978-0321437341, 0321437349
Full download Securing VoIP Networks Threats Vulnerabilities Countermeasures 1st Edition after payment

Product details:
ISBN 10: 0321437349
ISBN 13: 978-0321437341
Author: Peter Thermos, Ari Takanen
InSecuring VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
Table of contents:
Chapter 1: Introduction
Chapter 2: VoIP Architectures and Protocols
Chapter 3: Threats and Attacks
Chapter 4: VoIP Vulnerabilities
Chapter 5: Signaling Protection Mechanisms
Chapter 6: Media Protection Mechanisms
Chapter 7: Key Management Mechanisms
Chapter 8: VoIP and Network Security Controls
Chapter 9: A Security Framework for Enterprise VoIP Networks
Chapter 10: Provider Architectures and Security
Chapter 11: Enterprise Architectures and Security
People also search for:
is voip traffic encrypted
voip vulnerabilities and countermeasures
voip security
securing voip
10 vulnerabilities in voip
Tags: Peter Thermos, Ari Takanen, Securing VoIP Networks, Vulnerabilities Countermeasures


