skip to content
How to cheat at VoIP security Preview this item
ClosePreview this item
Checking...

How to cheat at VoIP security

Author: Thomas Porter, PhD.; Michael Gough
Publisher: Rockland, Mass. : Syngress, ©2007.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Porter, Thomas, PhD.
How to cheat at VoIP security.
Rockland, MA : Syngress, ©2007
(DLC) 2007298838
(OCoLC)144227884
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Thomas Porter, PhD.; Michael Gough
ISBN: 9780080553535 0080553532
OCLC Number: 298780513
Description: 1 online resource (xx, 412 pages) : illustrations
Contents: Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
Responsibility: Thomas Porter, Michael Gough.
More information:

Abstract:

Suitable for the multitasked sys admin, this title presents an introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It also gives the  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/298780513> # How to cheat at VoIP security
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "298780513" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/103207535#Place/rockland_mass> ; # Rockland, Mass.
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/103207535#Topic/internet_telephony_security_measures> ; # Internet telephony--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/103207535#Topic/computers_system_administration_email_administration> ; # COMPUTERS--System Administration--Email Administration
    schema:about <http://dewey.info/class/004.69/e22/> ;
    schema:author <http://viaf.org/viaf/15062250> ; # Michael Gough
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2007" ;
    schema:creator <http://viaf.org/viaf/73607180> ; # PhD. Thomas Porter
    schema:datePublished "2007" ;
    schema:description "Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure."@en ;
    schema:description "Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/103207535> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/144227884> ;
    schema:name "How to cheat at VoIP security"@en ;
    schema:productID "298780513" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/298780513#PublicationEvent/rockland_mass_syngress_2007> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/103207535#Agent/syngress> ; # Syngress
    schema:url <http://er.llcc.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=211410> ;
    schema:url <http://www.sciencedirect.com/science/book/9781597491693> ;
    schema:url <http://www.myilibrary.com?id=106026> ;
    schema:url <http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597491693> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=211410> ;
    schema:url <http://0-search.ebscohost.com.librarycatalog.vts.edu/login.aspx?direct=true&scope=site&db=nlebk&AN=211410> ;
    schema:url <http://site.ebrary.com/id/10201806> ;
    schema:url <https://cornell-library.skillport.com/skillportfe/main.action?assetid=25450> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491693> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=211410> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=25450> ;
    schema:workExample <http://worldcat.org/isbn/9780080553535> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB6H2038> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/298780513> ;
    .


Related Entities

<http://dproxy.library.dc-uoit.ca/login?url=https://www.sciencedirect.com/science/book/9781597491693>
    rdfs:comment "eBook available for Durham College via Elsevier. Click link to access" ;
    .

<http://experiment.worldcat.org/entity/work/data/103207535#Place/rockland_mass> # Rockland, Mass.
    a schema:Place ;
    schema:name "Rockland, Mass." ;
    .

<http://experiment.worldcat.org/entity/work/data/103207535#Topic/computers_system_administration_email_administration> # COMPUTERS--System Administration--Email Administration
    a schema:Intangible ;
    schema:name "COMPUTERS--System Administration--Email Administration"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=211410>
    rdfs:comment "from EBSCO Academic Collection" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://viaf.org/viaf/15062250> # Michael Gough
    a schema:Person ;
    schema:birthDate "1963" ;
    schema:familyName "Gough" ;
    schema:givenName "Michael" ;
    schema:name "Michael Gough" ;
    .

<http://viaf.org/viaf/73607180> # PhD. Thomas Porter
    a schema:Person ;
    schema:familyName "Porter" ;
    schema:givenName "Thomas" ;
    schema:name "PhD. Thomas Porter" ;
    .

<http://worldcat.org/isbn/9780080553535>
    a schema:ProductModel ;
    schema:isbn "0080553532" ;
    schema:isbn "9780080553535" ;
    .

<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597491693>
    rdfs:comment "Full text available from Referex Security and Networking" ;
    .

<http://www.worldcat.org/oclc/144227884>
    a schema:CreativeWork ;
    rdfs:label "How to cheat at VoIP security." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/298780513> ; # How to cheat at VoIP security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.