Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Security

Buy
Voice over IP Security, 9781587054693 (1587054698), Cisco Press, 2008

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). Another type of security issue is how to implement lawful interception within complicated service architectures according to government requirements.

 

Voice over IP Security focuses on the analysis of current and future threats, the evaluation of security products, the methodologies of protection, and best practices for architecture design and service deployment. This book not only covers technology concepts and issues, but also provides detailed design solutions featuring current products and protocols so that you can deploy a secure VoIP service in the real world with confidence.

 

Voice over IP Security gives you everything you need to understand the latest security threats and design solutions to protect your VoIP network from fraud and security incidents.

 

Patrick Park has been working on product design, network architecture design, testing, and consulting for more than 10 years. Currently Patrick works for Cisco® as a VoIP test engineer focusing on security and interoperability testing of rich media collaboration gateways. Before Patrick joined Cisco, he worked for Covad Communications as a VoIP security engineer focusing on the design and deployment of secure network architectures and lawful interception (CALEA). Patrick graduated from the Pusan National University in South Korea, where he majored in computer engineering.

 

Understand the current and emerging threats to VoIP networks

Learn about the security profiles of VoIP protocols, including SIP, H.323, and MGCP

Evaluate well-known cryptographic algorithms such as DES, 3DES, AES, RAS, digital signature (DSA), and hash function (MD5, SHA, HMAC)

Analyze and simulate threats with negative testing tools

Secure VoIP services with SIP and other supplementary protocols

Eliminate security issues on the VoIP network border by deploying an SBC

Configure enterprise devices, including firewalls, Cisco Unified Communications Manager, Cisco Unified Communications Manager Express, IP phones, and multilayer switches to secure VoIP network traffic

Implement lawful interception into VoIP service environments

 

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged

networks, and implement network

solutions for increased productivity.

 

Category: Networking—IP Communication

Covers: VoIP Security

(HTML tags aren't allowed.)

Accounting (Available Titles CengageNOW)
Accounting (Available Titles CengageNOW)

The authors of ACCOUNTING, 23e, understand that you need to find important information quickly. This textbook uses an integrated learning system to help you complete homework and lead you to accounting mastery. Building on the authors' proven approach, clear examples and high-impact writing guide you through the preparation of financial...

Feynman Lectures On Gravitation (Frontiers in Physics)
Feynman Lectures On Gravitation (Frontiers in Physics)

During the 1962-63 academic year, Richard Feynman taught a course at Caltech on gravitation. Taking an untraditional approach to the subject, Feynman aimed the course at advanced graduate students and postdoctoral fellows who were familiar with the methods of relativistic quantum field theory-in particular, with Feynman-diagram perturbation...

Data Mining with Microsoft SQL Server 2008
Data Mining with Microsoft SQL Server 2008

The most authoritative book on data mining with SQL Server 2008

SQL Server Data Mining has become the most widely deployed data mining server in the industry. Business users—and even academic and scientific users—have adopted SQL Server data mining because of its scalability, availability, extensive functionality, and ease of...


Successful Time Management For Dummies
Successful Time Management For Dummies

Do you need help with time management? Need to better manage your time at work or at home? Feel like there are never enough hours in the day? Successful Time Management For Dummies delivers practical solutions for getting organized, working better and faster, reducing stress, and getting rid of time-wasting distractions. You’ll...

Pro jQuery in Oracle Application Express
Pro jQuery in Oracle Application Express

Building on your existing SQL skills, this book teaches you how to apply useful jQuery techniques to applications developed using the Oracle Application Express (APEX) development tool.

Pro jQuery in Oracle Application Express covers the fundamentals you need to start enhancing your applications, with some practical...

Beginning Object-Oriented ASP.NET 2.0 with VB .NET: From Novice to Professional (Beginning: From Novice to Professional)
Beginning Object-Oriented ASP.NET 2.0 with VB .NET: From Novice to Professional (Beginning: From Novice to Professional)
This book was born out of a lunch that I had with two colleagues of mine. They both had
an extensive background in mainframe development, but they were struggling to understand
what OOP was and how they should apply it. During the conversation, I explained
some of the basics of OOP and afterwards thought about better ways to teach
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy