logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures by Peter Thermos, Ari Takanen ISBN 9780321437341, 0321437349

  • SKU: EBN-983384
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.4

32 reviews
Instant download (eBook) Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures after payment.
Authors:Peter Thermos, Ari Takanen
Pages:384 pages.
Year:2007
Editon:1
Publisher:Addison-Wesley Professional
Language:english
File Size:5.52 MB
Format:pdf
ISBNS:9780321437341, 0321437349
Categories: Ebooks

Product desciption

(Ebook) Securing VoIP Networks: Threats, Vulnerabilities, Countermeasures by Peter Thermos, Ari Takanen ISBN 9780321437341, 0321437349

In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer proven, detailed recommendations for securing them. Drawing on case studies from their own fieldwork, the authors address VoIP security from the perspective of real-world network implementers, managers, and security specialists. The authors identify key threats to VoIP networks, including eavesdropping, unauthorized access, denial of service, masquerading, and fraud; and review vulnerabilities in protocol design, network architecture, software, and system configuration that place networks at risk. They discuss the advantages and tradeoffs associated with protection mechanisms built into SIP, SRTP, and other VoIP protocols; and review key management solutions such as MIKEY and ZRTP. Next, they present a complete security framework for enterprise VoIP networks, and provide detailed architectural guidance for both service providers and enterprise users.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products