Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
IPTV Security: Protecting High-Value Digital Contents

Buy

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.

IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented.

  • One of the only books available on IPTV Security
  • Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures
  • Detailed descriptions allow readers to understand the technology even if new to the field
  • A complete reference guide to the security aspects of IPTV.

This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.

About the Author

David Ramirez, Alcatel-Lucent, UK. David is Senior Manager of Alcatel-Lucent’s Security Consulting practice where his responsibilities include Innovation & Technology, Thought Leadership and Knowledge Sharing. He has contributed to several magazines, newspapers and web sites on topics such as Ethical Hacking, Web Security, Security Incidents, Forensics, Digital Certificates, etc. David is the author of a white paper on IPTV Threats for Lucent, interviews and articles for the IEC, Lucent, Webtorials, magazines in Europe and the US. He is also speaker at several European and Easter European conferences on security and telecommunications, where he presented the topic of IPTV Security, security for converged networks and networking security.

(HTML tags aren't allowed.)

Information Systems Transformation: Architecture-Driven Modernization Case Studies
Information Systems Transformation: Architecture-Driven Modernization Case Studies

Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and...

Simplexity: Why Simple Things Become Complex (and How Complex Things Can Be Made Simple)
Simplexity: Why Simple Things Become Complex (and How Complex Things Can Be Made Simple)

"Sure to be a deserved hit among the ever-growing Freakonomics crowd."
--Booklist

"Kluger makes the modern world comprehensible."
--Publishers Weekly

"A fascinating journey."
--Library Journal

Sometimes a complex...

Palm webOS
Palm webOS

This is the official guide to building native JavaScript applications for Palm's new mobile operating system, Palm® webOS™. Written by Palm's software chief technology officer along with the Palm webOS development team, Palm webOS provides a complete tutorial on the design principles, architecture, UI, tools, and...


Arduino Microcontroller Processing for Everyone! (Synthesis Lectures on Digital Circuits and Systems)
Arduino Microcontroller Processing for Everyone! (Synthesis Lectures on Digital Circuits and Systems)

This book is about the Arduino microcontroller and the Arduino concept. The visionary Arduino team of Massimo Banzi, David Cuartielles, Tom Igoe, Gianluca Martino, and David Mellis launched a new innovation in microcontroller hardware in 2005, the concept of open source hardware. Their approach was to openly share details of...

Determining Project Requirements (ESI International Project Mgmt)
Determining Project Requirements (ESI International Project Mgmt)

Organizations waste millions of dollars every year on failed projects. Failure is practically guaranteed by poor or incomplete requirements that do not properly define projects in their initial stages.  Business analysis is the critical process ensuring projects start on the path toward success. To accurately determine project...

Getting Started with Intel Galileo
Getting Started with Intel Galileo

Getting Started with the Intel Galileo gets you up and running with this new, x86-powered board that was developed in collaboration between Arduino and Intel. You'll learn how to set it up, connect it to your computer, and begin programming. You'll learn how to build electronics projects around the Galileo, and you'll explore the...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy