How to cheat at VoIP security
(eBook)
Author
Contributors
Published
Rockland, MA : Syngress, ©2007, [2011].
Format
eBook
Edition
1st ed.
ISBN
0080553532, 1597491691, 9780080553535, 9781597491693
Physical Desc
1 online resource (1 volume) : illustrations
Status
Description
Loading Description...
Also in this Series
Checking series information...
More Details
Language
English
Notes
Description
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde.
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Porter, T., & Gough, M. (20072011). How to cheat at VoIP security . Syngress.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Porter, Thomas and Michael. Gough. 20072011. How to Cheat At VoIP Security. Syngress.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Porter, Thomas and Michael. Gough. How to Cheat At VoIP Security Syngress, 20072011.
MLA Citation, 9th Edition (style guide)Porter, Thomas., and Michael Gough. How to Cheat At VoIP Security Syngress, 20072011.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
10d2dba1-b02e-0932-7f10-2fe302fbccc8-eng
Grouping Information
Grouped Work ID | 10d2dba1-b02e-0932-7f10-2fe302fbccc8-eng |
---|---|
Full title | how to cheat at voip security |
Author | porter thomas |
Grouping Category | book |
Last Update | 2024-09-06 16:31:08PM |
Last Indexed | 2024-09-25 02:14:36AM |
Marc Record
First Detected | Jul 29, 2024 04:00:59 PM |
---|---|
Last File Modification Time | Sep 06, 2024 04:35:08 PM |
MARC Record
LEADER | 02640cam a2200445 a 4500 | ||
---|---|---|---|
001 | ocn889254206 | ||
003 | OCoLC | ||
005 | 20240830103855.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 140826t20072011maua o 001 0 eng d | ||
020 | |a 0080553532 | ||
020 | |a 1597491691 | ||
020 | |a 9780080553535 | ||
020 | |a 9781597491693 | ||
020 | |z 9781597491693 | ||
035 | |a (OCoLC)889254206 | ||
037 | |a CL0500000473|b Safari Books Online | ||
040 | |a UMI|b eng|e pn|c UMI|d DEBBG|d DEBSZ|d OCLCQ|d OCLCF|d CNCGM|d OCLCQ|d CEF|d UAB|d AU@|d VLY|d OCLCO|d OCLCQ|d OCLCO|d INARC|d OCLCL | ||
049 | |a FMGA | ||
050 | 4 | |a TK5105.8865|b .P67 2011 | |
082 | 0 | 4 | |a 621.385|2 22 |
100 | 1 | |a Porter, Thomas.|0 http://id.loc.gov/authorities/names/no2005009716 | |
245 | 1 | 0 | |a How to cheat at VoIP security /|c Thomas Porter, Michael Gough. |
250 | |a 1st ed. | ||
260 | |a Rockland, MA :|b Syngress,|c ©2007, [2011] | ||
300 | |a 1 online resource (1 volume) :|b illustrations | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
490 | 1 | |a How to Cheat | |
505 | 0 | |a Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup. | |
520 | |a The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde. | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed August 18, 2014). | |
650 | 0 | |a Internet telephony|x Security measures. | |
650 | 0 | |a Computer networks|x Security measures.|0 http://id.loc.gov/authorities/subjects/sh94001277 | |
700 | 1 | |a Gough, Michael. | |
758 | |i has work:|a How to cheat at Voip security (Text)|1 https://id.oclc.org/worldcat/entity/E39PCFV7tCkqFXHM7Jfhftb7xP|4 https://id.oclc.org/worldcat/ontology/hasWork | ||
830 | 0 | |a "How to cheat--"|0 http://id.loc.gov/authorities/names/no2007134569 | |
856 | 4 | 0 | |u https://www.aclib.us/OReilly |