Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IPTV Security: Protecting High-Value Digital Contents

Buy

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.

IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented.

  • One of the only books available on IPTV Security
  • Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures
  • Detailed descriptions allow readers to understand the technology even if new to the field
  • A complete reference guide to the security aspects of IPTV.

This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.

About the Author

David Ramirez, Alcatel-Lucent, UK. David is Senior Manager of Alcatel-Lucent’s Security Consulting practice where his responsibilities include Innovation & Technology, Thought Leadership and Knowledge Sharing. He has contributed to several magazines, newspapers and web sites on topics such as Ethical Hacking, Web Security, Security Incidents, Forensics, Digital Certificates, etc. David is the author of a white paper on IPTV Threats for Lucent, interviews and articles for the IEC, Lucent, Webtorials, magazines in Europe and the US. He is also speaker at several European and Easter European conferences on security and telecommunications, where he presented the topic of IPTV Security, security for converged networks and networking security.

(HTML tags aren't allowed.)

Apoptosome: An up-and-coming therapeutical tool
Apoptosome: An up-and-coming therapeutical tool

"Apoptosome" is the first book that presents a concise synthesis of recent developments in the understanding of how the activation of the cell death cascade is handled by a cytosolic signalling platform known as the apoptosome.

The book also discusses how insights into the regulation of apoptosome may be exploited for designing...

Advances in Structural Engineering: Materials, Volume Three
Advances in Structural Engineering: Materials, Volume Three

The book presents research papers presented by academicians, researchers, and practicing structural engineers from India and abroad in the recently held Structural Engineering Convention (SEC) 2014 at Indian Institute of Technology Delhi during 22 – 24 December 2014. The book is divided into three volumes and encompasses...

Lex & Yacc (A Nutshell Handbook)
Lex & Yacc (A Nutshell Handbook)

This book shows you how to use two Unix utilities, lex and yacc, in program development. These tools help programmers build compilers and interpreters, but they also have a wider range of applications. The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users....


Quotient Space Based Problem Solving: A Theoretical Foundation of Granular Computing
Quotient Space Based Problem Solving: A Theoretical Foundation of Granular Computing
The term problem solving is used in many disciplines, sometimes with different perspectives. As one of the important topics in artificial intelligence (AI) research, it is a computerized process of human problem-solving behaviors. So the aim of problem solving is to develop techniques that program computers to find solutions...
Mortality and Maldevelopment: Part I: congenital cardiovascular malformations (Pt. 1)
Mortality and Maldevelopment: Part I: congenital cardiovascular malformations (Pt. 1)
Despite intense study during the 20th century, at its end the causes of the great majority of congenital malformations were still unknown. Several means had been used to try to remedy this unsatisfactory situation, a major one being the epidemiological approach, that is, by analyzing patterns of occurrence and association....
Motorola Xoom: The Missing Manual
Motorola Xoom: The Missing Manual

What’s a spectacular entertainment device, runs thousands of apps, connects you to the Internet, lets you take high-resolution photos and videos, handles any email you can throw at it, is a wizard at Facebook and other social networking services, lets you videochat with people across the world, opens the world of electronic...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy