回首頁 到查詢結果 [ subject:"Internet telephony- Security measures." ]

Securing VoIP = keeping your VoIP ne...
Bates, Regis J.,

FindBook      Google Book      Amazon      博客來     
  • Securing VoIP = keeping your VoIP network safe /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Securing VoIP/ Regis J. (Bud) Bates.
    其他題名: keeping your VoIP network safe /
    作者: Bates, Regis J.,
    出版者: Amsterdam :Elsevier, : 2015.,
    面頁冊數: 1 online resource (xiii, 207 p.) :ill.
    附註: Includes index.
    內容註: Cover; Title Page; Copyright Page; Contents; Technical editor biography; About the author; Expertise; Publications; Books; Articles; Acknowledgments; Chapter 1 -- Introduction; Securing Voice over Internet Protocol (VoIP): keeping your network safe; History of telephony; History of the Internet Protocol; What goes around comes around; VoIP network and potential problems; The benefits of VoIP; Some initial thoughts on VoIP; What are the reasons for the VoIP hacking attempts; The need for VoIP security; Need for security and causes; Technology; Policy; Terms and attacks; Other vulnerabilities.
    內容註: What is at riskCan a call be eavesdropped?; There is no Holy Grail out there; Summary; Chapter 2 -- Policies; What is the problem?; The call control channel -- hijacking; Softphone issues; Denial-of-service attacks; Security concerns; Security policy needs; Vulnerability detection and auditing; Is the system vulnerable?; Chapter 3 -- VoIP virtual private networks (VPNs); Virtual private networks (VPNs) and encryption; What is a VPN?; The possible VPN solutions; What a VPN can offer; What everyone expects from securing VoIP; What is the impact?; Creating the VPN; IPSec used for site-to-site VPNs.
    內容註: Disadvantages of IPSec VPN site-to-site tunnelsSummary; Chapter 4 -- Cryptography solutions; Cryptography solutions; What is cryptography and encryption?; Early ciphers used; Digital signatures; Leads to a public key infrastructure; X.509 certificates; Digital certificate servers; Installing certificates on the devices; Summary; Chapter 5 -- Authentication; Authentication defined; Details of 802.1x authentication; Use a VoIP-enabled firewall; Use 802.1X authentication for IP phones; Attacking VoIP Authentication; Encrypt the traffic; Authentication on wireless networks; Summary.
    內容註: Chapter 6 -- Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 -- The business case for securing VoIP; Before we start.
    內容註: Overview of the RFC 2196Internal issues; Toll fraud -- a big threat; Summary; Chapter 8 -- Approaches to VoIP security; Before we start; Build it in layers; Some best practices for infrastructure security; Integrating network security; Additional thoughts and items; Registration spoofing; Summary; Chapter 9 -- Final thoughts; Before we start; What we have already covered; Vendor issues; Controlling the risks; PBX best practices; Summary; Index.
    標題: Internet telephony - Security measures. -
    電子資源: https://www.sciencedirect.com/science/book/9780124170391
    ISBN: 9780124171220 (electronic bk.)
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9395911 電子資源 11.線上閱覽_V 電子書 EB TK5105.8865 .B38 2015eb 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入