Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/autre/securing-voip/bud/descriptif_3568547
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3568547

Securing VoIP Keeping Your VoIP Network Safe

Langue : Anglais

Auteur :

Couverture de l’ouvrage Securing VoIP

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company?s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

  1. The VoIP Network & Potential Problems
  2. Security Policies and Procedures
  3. Cryptography Solutions
  4. Secure Voice over Internet Protocol
  5. Business Case for VoIP Security
  6. Host Based Approaches
  7. Integrating VoIP Security
  8. The Future of VoIP Security

Information security professionals, system administrators. Security managers.

Regis J. "Bud" Bates has more than 30 years of experience in Telecommunications and Information Services and has long been considered a technology "Guru." He currently contributes to these fields as an author, consultant, course developer and teacher. As an Author, Bud has written numerous books on the technologies, including "Voice and Data Communications Handbook”, and the “Broadband Telecom Handbook”. As a Consultant, with clients spanning the range of Fortune 100-500 companies, Bud has been involved in the design of major voice and data networks. His innovative ideas in implementation have been profiled in trade journals and magazines. Many of his projects deal with multiple sites and countries using Frame Relay and ATM architectures. As a Teacher, Bud has develops and conducts various public and in-house seminars ranging from a managerial overview to very technical hands-on classes on Voice over IP, WiFi Networking, WIMAX networking, DWDM and IPv6. In the recent past he has focused much of his development and training activities on the convergence of three key areas;

VoIP,Security and WiFi.

  • Explains the business case for securing VoIP Systems
  • Presents hands-on tools that show how to defend a VoIP network against attack.
  • Provides detailed case studies and real world examples drawn from the authors’ consulting practice.
  • Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
  • Covers the security policies and procedures that need to be in place to keep VoIP communications safe.

Date de parution :

Ouvrage de 220 p.

19x23.4 cm

Disponible chez l'éditeur (délai d'approvisionnement : 14 jours).

49,51 €

Ajouter au panier

Mots-clés :

802.1X; Advanced Encryption Standard (AES); asymmetrical; audits; Authentication; autoregistration; best practices; BYOD; call control channel; call hijacking; cellular devices; certificates; certificates of authority; crime triangle; Cryptography; denial of service (DoS); DHCP; disaster recovery; distributed denial of service (DDoS); eavesdropping; encryption; end-to-end; Extensible Authentication Protocol (EAP); false tunnel; forking; GARP; H.323; host VoIP IPS (include DHCP and DNS hosts); integrated network security; IP PBX; layer 2; layer 3; Linux; man-in-the-middle (MITM) attacks; media channel; MIKEY; MS-CHAP version 2; NAT; NIST 800-24; packets; Policies; private key; Protected EAP (PEAP); proxy server; public key; redirection; remote access; RFC 2196; RTCP; RTP; Secure Real-Time Transport Control Protocol (SRTCP); Secure Real-Time Transport Protocol (SRTP); Secure Session Initiation Protocol (SSIP or SIPS); session border controllers (SBC); SIP; smartphones; social engineering; softphones; Spam over Internet Telephony (SPIT); SSL; steel pipe; symmetrical; TCP/IP; TDM; technology; telephony; TLS; Toll fraud; transfer to 9011; Transport Layer Security (TLS); tunnels; vendor issues; vishing; VoIP Anti-SPIT; VoIP aware firewalls; VoIP DoS defenses; VoIP Intrusion Prevention Systems (VIPS); VoIP Network Access Control (VNAC); VoIP network intrusion detection systems (IDS); VOMIT; VPN; Wi-Fi; Wireshark; X.509 public key infrastructure; Zimmerman Real-Time Transport Protocol (ZRTP); zombies