How to cheat at VoIP security

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Full description

Bibliographic Details
Main Author: Porter, Thomas
Other Authors: Gough, Michael
Format: eBook
Language:English
Published: Rockland, MA Syngress 2007
Edition:1st ed
Series:How to Cheat
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02115nmm a2200373 u 4500
001 EB001924509
003 EBX01000000000000001087411
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 0080553532 
020 |a 1597491691 
020 |a 9780080553535 
050 4 |a TK5105.8865 
100 1 |a Porter, Thomas 
245 0 0 |a How to cheat at VoIP security  |c Thomas Porter, Michael Gough 
250 |a 1st ed 
260 |a Rockland, MA  |b Syngress  |c 2007 
300 |a 1 volume  |b illustrations 
505 0 |a Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Internet telephony / Security measures 
653 |a Computer networks / Security measures / fast 
653 |a Téléphonie Internet / Sécurité / Mesures 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
700 1 |a Gough, Michael 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a How to Cheat 
776 |z 9781597491693 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597491693/?ar  |x Verlag  |3 Volltext 
082 0 |a 331 
082 0 |a 621.385 
520 |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde