How to cheat at VoIP security
(eBook)

Book Cover
Average Rating
Contributors
Published
Rockland, MA : Syngress, ©2007, [2011].
Format
eBook
Edition
1st ed.
ISBN
0080553532, 1597491691, 9780080553535, 9781597491693
Physical Desc
1 online resource (1 volume) : illustrations
Status

Description

Loading Description...

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Syndetics Unbound

More Details

Language
English

Notes

Description
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Porter, T., & Gough, M. (20072011). How to cheat at VoIP security . Syngress.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Porter, Thomas and Michael. Gough. 20072011. How to Cheat At VoIP Security. Syngress.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Porter, Thomas and Michael. Gough. How to Cheat At VoIP Security Syngress, 20072011.

MLA Citation, 9th Edition (style guide)

Porter, Thomas., and Michael Gough. How to Cheat At VoIP Security Syngress, 20072011.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
10d2dba1-b02e-0932-7f10-2fe302fbccc8-eng
Go To Grouped Work

Grouping Information

Grouped Work ID10d2dba1-b02e-0932-7f10-2fe302fbccc8-eng
Full titlehow to cheat at voip security
Authorporter thomas
Grouping Categorybook
Last Update2024-09-06 16:31:08PM
Last Indexed2024-09-25 02:14:36AM

Marc Record

First DetectedJul 29, 2024 04:00:59 PM
Last File Modification TimeSep 06, 2024 04:35:08 PM

MARC Record

LEADER02640cam a2200445 a 4500
001ocn889254206
003OCoLC
00520240830103855.0
006m     o  d        
007cr unu||||||||
008140826t20072011maua    o     001 0 eng d
020 |a 0080553532
020 |a 1597491691
020 |a 9780080553535
020 |a 9781597491693
020 |z 9781597491693
035 |a (OCoLC)889254206
037 |a CL0500000473|b Safari Books Online
040 |a UMI|b eng|e pn|c UMI|d DEBBG|d DEBSZ|d OCLCQ|d OCLCF|d CNCGM|d OCLCQ|d CEF|d UAB|d AU@|d VLY|d OCLCO|d OCLCQ|d OCLCO|d INARC|d OCLCL
049 |a FMGA
050 4|a TK5105.8865|b .P67 2011
08204|a 621.385|2 22
1001 |a Porter, Thomas.|0 http://id.loc.gov/authorities/names/no2005009716
24510|a How to cheat at VoIP security /|c Thomas Porter, Michael Gough.
250 |a 1st ed.
260 |a Rockland, MA :|b Syngress,|c ©2007, [2011]
300 |a 1 online resource (1 volume) :|b illustrations
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
4901 |a How to Cheat
5050 |a Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup.
520 |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.
5880 |a Online resource; title from title page (Safari, viewed August 18, 2014).
650 0|a Internet telephony|x Security measures.
650 0|a Computer networks|x Security measures.|0 http://id.loc.gov/authorities/subjects/sh94001277
7001 |a Gough, Michael.
758 |i has work:|a How to cheat at Voip security (Text)|1 https://id.oclc.org/worldcat/entity/E39PCFV7tCkqFXHM7Jfhftb7xP|4 https://id.oclc.org/worldcat/ontology/hasWork
830 0|a "How to cheat--"|0 http://id.loc.gov/authorities/names/no2007134569
85640|u https://www.aclib.us/OReilly