Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

Buy

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts. Although I was interested in this problem space, I only knew the subject from the point of view of a security researcher who has not studied VoIP itself in any great depth. As such, this project served as an ideal vehicle in educating me about VoIP security.

This book is the result of more than 18 months’ work to learn what the challenges and opportunities are in securing VoIP. It is primarily addressed to students and researchers who want to learn about VoIP security, and is meant as both an introduction to the problem space and an extensive reference to related work as of early 2011. It is also intended as a case study on how to approach and map out a new research area.

The structure of this book reflects my learning process. We start by learning the lay of the land (Overview of VoIP Systems).We then proceed to find out what actual problems are encountered by VoIP systems by looking at reported vulnerabilities (Survey and Analysis of VoIP/IMS Vulnerabilities). Finally, we explore as much of the prior work in this space as I could find (Survey of VoIP Security Research Literature). The book concludes with some comparative analysis and practical recommendations for securing VoIP systems and infrastructures.

(HTML tags aren't allowed.)

Discrete Geometry for Computer Imagery: 16th IAPR International Conference, DGCI 2011, Nancy, France
Discrete Geometry for Computer Imagery: 16th IAPR International Conference, DGCI 2011, Nancy, France
The 16th edition of the International Conference on Discrete Geometry for Computer Imagery was held in Nancy, France, April 6–8, 2011, and was organized by the ADAGIo team of the LORIA laboratory (Lorraine research center in computer science and its applications). DGCI 2011 attracted many researchers from all around the...
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects
Machine Learning with AWS: Explore the power of cloud services for your machine learning and artificial intelligence projects

Use artificial intelligence and machine learning on AWS to create engaging applications

Key Features

  • Explore popular AI and ML services with their underlying algorithms
  • Use the AWS environment to manage your AI workflow
  • Reinforce key concepts with hands-on...
The Seven Desires of Every Heart
The Seven Desires of Every Heart
We believe that God created us with seven basic, universal desires. Each of us desires to be heard and understood, to be affirmed, to be blessed, to be safe, to be touched, to be chosen, and to be included. Having and fulfilling these desires validates our very existence. If these basic desires are fulfilled, we will enjoy a deeper and richer...

Ethical Hacking and Penetration Testing Guide
Ethical Hacking and Penetration Testing Guide

Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret the results of modern-day hacking tools, which are required to complete a...

Diseases of the Kidney and Urinary Tract (Diseases of the Kidney (Schrier))
Diseases of the Kidney and Urinary Tract (Diseases of the Kidney (Schrier))

The thoroughly updated Eighth Edition of this classic three-volume work provides the most comprehensive, current, and authoritative information on diseases of the kidney and urinary tract. This clinically oriented reference focuses on diagnosis and treatment of specific diseases, disorders, and complications and incorporates the...

IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy