VoIP security

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, impleme...

Πλήρης περιγραφή

Κύριος συγγραφέας: Ransome, James F.
Άλλοι συγγραφείς: Rittinghouse, John W.
Μορφή: Ηλεκτρονική πηγή
Γλώσσα: English
Στοιχεία έκδοσης: Amsterdam ; Boston : Elsevier, c2005.
Θέματα:
Διαθέσιμο Online: http://www.sciencedirect.com/science/book/9781555583323
Ετικέτες: Προσθήκη ετικέτας
Δεν υπάρχουν, Καταχωρήστε ετικέτα πρώτοι!
LEADER 02651cam a2200361 a 4500
001 1/38234
008 090910s2005 ne 001 0 eng
020 |a 9781555583323 
020 |a 1555583326 
020 |a 9780080470467 (electronic bk.) 
020 |a 0080470467 (electronic bk.) 
020 |a 1280964480 
020 |a 9781280964480 
035 |l 40872 
040 |a OPELS  |b eng  |c OPELS  |d OKU  |d OCLCQ  |d N$T  |d MERUC  |d IDEBK  |d E7B  |d OCLCQ  |d GR-PeUP 
100 1 |a Ransome, James F. 
245 1 0 |a VoIP security  |h [electronic resource] /  |c James F. Ransome, John W. Rittinghouse. 
260 |a Amsterdam ;  |a Boston :  |b Elsevier,  |c c2005. 
300 |a 1 online resource (xxvii, 402 p.) :  |b ill. 
504 |a Includes bibliographical references (p. 379-384) and index. 
505 0 |a The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. 
520 |a Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability. 
650 4 |a Internet telephony  |x Security measures. 
655 4 |a Electronic books. 
700 1 |a Rittinghouse, John W. 
852 |a INST  |b UNIPILB  |c EBOOKS  |e 20100705  |p 00b40872  |q 00b40872  |t ONLINE  |y 0 
856 4 0 |3 ScienceDirect  |u http://www.sciencedirect.com/science/book/9781555583323 
856 4 |d /webopac/covers/02/40872_9781555583323.jpg 
856 4 |d /webopac/covers/02/40872_1555583326.jpg 
856 4 |d /webopac/covers/02/40872_9780080470467.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/02/40872_0080470467.jpg  |z (electronic bk.) 
856 4 |d /webopac/covers/02/40872_1280964480.jpg 
856 4 |d /webopac/covers/02/40872_9781280964480.jpg