Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SIP Security

Buy
SIP Security, 9780470516362 (0470516364), John Wiley & Sons, 2009
This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted.

Key Features:

  • Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP security
  • Discusses key aspects of SIP security including authentication, integrity, confidentiality, non-repudiation and signalling
  • Assesses the real security issues facing users of SIP, and details the latest theoretical and practical solutions to SIP Security issues
  • Covers secure SIP access, inter-provider secure communication, media security, security of the IMS infrastructures as well as VoIP services vulnerabilities and countermeasures against Denial-of-Service attacks and VoIP spam
This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.
(HTML tags aren't allowed.)

Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)
Risk and Interdependencies in Critical Infrastructures: A Guideline for Analysis (Springer Series in Reliability Engineering)

Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure...

For Better or for Worse
For Better or for Worse
The development of an American science establishment -- today an amalgam of scientists, engineers, universities, industrial laboratories, and federal science agencies -- began early in the twentieth century when the federal government began to invest in a national scientific infrastructure. During World War II this investment swelled to colossal...
Physics in Biology and Medicine, Fourth Edition (Complementary Science)
Physics in Biology and Medicine, Fourth Edition (Complementary Science)

Physics in Biology and Medicine, Fourth Edition explores concepts in physics as they apply to living systems. The discussion is organized into 18 chapters encompassing thermodynamics, electricity, optics, sound, solid mechanics, fluid mechanics, and atomic and nuclear physics. Each chapter provides a brief review of the background physics...


DocBook 5: The Definitive Guide
DocBook 5: The Definitive Guide

If you need a reliable tool for technical documentation, this clear and concise reference will help you take advantage of DocBook, the popular XML schema originally developed to document computer and hardware projects. DocBook 5.0 has been expanded and simplified to address documentation needs in other fields, and it's quickly...

The Job Interview Phrase Book: The Things to Say to Get You the Job You Want
The Job Interview Phrase Book: The Things to Say to Get You the Job You Want

"In today's marketplace it is critical that you stand out in a crowd."
--Eric Winegardener, Vice President, Monster Worldwide

In today's tightening job market, the interview is a key stage. But too often in job interviews, candidates freeze and can't find the words they need to make...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy