Master your Minecraft
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Best Books of the Year | December 10, 2014

    Mary Jo Schimelpfenig: IMG Best Fantasy/Sci-Fi of 2014



    Here are the books that knocked my socks off in 2014. All of them would make great gifts; each of them was truly something that evoked that... Continue »

    spacer
Qualifying orders ship free.
$64.95
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

How to Cheat at Voip Security (How to Cheat)

by

How to Cheat at Voip Security (How to Cheat) Cover

 

Synopses & Reviews

Publisher Comments:

The Perfect Reference for the Multitasked SysAdmin

This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.

* VoIP Isn’t Just Another Data Protocol

IP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator’s point of view, VoIP is different. Understand why.

* What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?

Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.

* The Security Considerations of Voice Messaging

Learn about the types of security attacks you need to protect against within your voice messaging system.

* Understand the VoIP Communication Architectures

Understand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.

* The Support Protocols of VoIP Environments

Learn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.

* Securing the Whole VoIP Infrastructure

Learn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.

* Authorized Access Begins with Authentication

Learn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.

* Understand Skype Security

Skype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.

* Get the Basics of a VoIP Security Policy

Use a sample VoIP Security Policy to understand the components of a complete policy.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently

*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs

*Avoid the time drains associated with securing VoIP

Synopsis:

All the newly installed Voice over Internet Protocol (VoIP) phone lines and handsets are accessible via the Internet and are vulnerable to malicious attack as well as spam. This book shows how to defend against exploit tools that can be used against VoIP systems.

Synopsis:

Voice over Internet Protocol (VoIP) is telephony over the internet. More than 3.1 million VoIP phone lines have been installed worldwide with installations of traditional PBX phone systems decreased by 36% in 2004 while VoIP installations increased by 54%. All of these newly installed VoIP phone lines and handsets are accessible via the internet and vulnerable to malicious attack as well as spam.

This book covers exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. Just enough coverage of products like Google Talk and Skype and IM and P2P technologies is provided.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently

*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs

*Avoid the time drains associated with securing VoIP

About the Author

Thomas Porter, Ph.D. (CISSP, CCNP, CCDA, CCSE/SA, ACE, IAM) served as the first Chief Information Security Officer (CISO) at Avaya, and is currently the Lead Security Architect for Business Communication Consulting and Director of IT Security for the FIFA 2006 World Cup in Germany He is a past member of the IP Security Protocol Working Group, and the Executive Telecommunications Board of the State University of New York. He is currently a member of the IEEE, and OASIS (Organization for the Advancement of Structured Information Standards). clients. Michael also presents for his company at many trade shows and conferences and works with associations and groups, advising agencies like the FBI on Skype security and the Center for Internet Security on wireless security.

Computer security consultant, host and webmaster, www.SkypeTips.com and www.VideoCallTips.com

Table of Contents

Chapter 1: Introduction to VoIP Security

Chapter 2: The Hardware Infrastructure

Chapter 3: Architectures

Chapter 4: Support Protocols

Chapter 5: VoIP Threats

Chapter 6: Confirming User Identity

Chapter 7: Security Monitoring

Chapter 8: Segregating Network Traffic

Chapter 9: VoIP IETF Encryption Solutions

Chapter 10: Skype Security

Chapter 11: Skype Firewall Setup

Appendix A: Sample VoIP Security Policy

Product Details

ISBN:
9781597491693
Author:
Porter, Thomas, Cissp
Publisher:
Syngress Publishing
Author:
Porter, Thomas
Author:
Gough, Michael
Subject:
Networking - General
Subject:
Security - General
Subject:
Security
Subject:
Networking-Computer Security
Series:
How to Cheat
Publication Date:
20070431
Binding:
TRADE PAPER
Language:
English
Illustrations:
Y
Pages:
432
Dimensions:
9 x 7 in

Related Subjects

Computers and Internet » Networking » Computer Security
Computers and Internet » Networking » General
Engineering » Communications » Telephony

How to Cheat at Voip Security (How to Cheat) New Trade Paper
0 stars - 0 reviews
$64.95 In Stock
Product details 432 pages Syngress Publishing - English 9781597491693 Reviews:
"Synopsis" by , All the newly installed Voice over Internet Protocol (VoIP) phone lines and handsets are accessible via the Internet and are vulnerable to malicious attack as well as spam. This book shows how to defend against exploit tools that can be used against VoIP systems.
"Synopsis" by , Voice over Internet Protocol (VoIP) is telephony over the internet. More than 3.1 million VoIP phone lines have been installed worldwide with installations of traditional PBX phone systems decreased by 36% in 2004 while VoIP installations increased by 54%. All of these newly installed VoIP phone lines and handsets are accessible via the internet and vulnerable to malicious attack as well as spam.

This book covers exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. Just enough coverage of products like Google Talk and Skype and IM and P2P technologies is provided.

*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently

*Short on theory, history, and technical data that ultimately is not helpful in performing their jobs

*Avoid the time drains associated with securing VoIP

spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.