Security for SIP-Based VoIP Networks
-10%
portes grátis
Security for SIP-Based VoIP Networks
Threat Modeling, Hardening, and Countermeasures
Rao, Vinay
Elsevier Science & Technology
02/2029
352
Mole
Inglês
9780750685276
Pré-lançamento - envio 15 a 20 dias após a sua edição
Descrição não disponível.
PART I: THE FUNDAMENTALS
Technology Overview
Telecommunications Networks
Data Communications Networks
Cryptography Fundamentals
Voice Over IP
A Brief Introduction to VoIP
Voice Over IP Architecture
SESSION INITIATION PROTOCOL (SIP)
SIP Fundamentals
Introduction to SIP
SIP Architecture
PART II: The SIP-Based VoIP Ecosystem
SIP Associated Protocols and Services
Opterational Overview
PART III: Securing SIP-Based VoIP
Section I: Threat Modeling
Threat Assessment
SIP Threat Assessment Models
Section II: Hardening and Countermeasures
Hardening Mechanisms
Secure SIP and RTP
Firewall and NAT Traversal
Section III: Security Analysis
Basic Security Analysis Toolkit
The Evolution of Threats
Appendices
Technology Overview
Telecommunications Networks
Data Communications Networks
Cryptography Fundamentals
Voice Over IP
A Brief Introduction to VoIP
Voice Over IP Architecture
SESSION INITIATION PROTOCOL (SIP)
SIP Fundamentals
Introduction to SIP
SIP Architecture
PART II: The SIP-Based VoIP Ecosystem
SIP Associated Protocols and Services
Opterational Overview
PART III: Securing SIP-Based VoIP
Section I: Threat Modeling
Threat Assessment
SIP Threat Assessment Models
Section II: Hardening and Countermeasures
Hardening Mechanisms
Secure SIP and RTP
Firewall and NAT Traversal
Section III: Security Analysis
Basic Security Analysis Toolkit
The Evolution of Threats
Appendices
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
PART I: THE FUNDAMENTALS
Technology Overview
Telecommunications Networks
Data Communications Networks
Cryptography Fundamentals
Voice Over IP
A Brief Introduction to VoIP
Voice Over IP Architecture
SESSION INITIATION PROTOCOL (SIP)
SIP Fundamentals
Introduction to SIP
SIP Architecture
PART II: The SIP-Based VoIP Ecosystem
SIP Associated Protocols and Services
Opterational Overview
PART III: Securing SIP-Based VoIP
Section I: Threat Modeling
Threat Assessment
SIP Threat Assessment Models
Section II: Hardening and Countermeasures
Hardening Mechanisms
Secure SIP and RTP
Firewall and NAT Traversal
Section III: Security Analysis
Basic Security Analysis Toolkit
The Evolution of Threats
Appendices
Technology Overview
Telecommunications Networks
Data Communications Networks
Cryptography Fundamentals
Voice Over IP
A Brief Introduction to VoIP
Voice Over IP Architecture
SESSION INITIATION PROTOCOL (SIP)
SIP Fundamentals
Introduction to SIP
SIP Architecture
PART II: The SIP-Based VoIP Ecosystem
SIP Associated Protocols and Services
Opterational Overview
PART III: Securing SIP-Based VoIP
Section I: Threat Modeling
Threat Assessment
SIP Threat Assessment Models
Section II: Hardening and Countermeasures
Hardening Mechanisms
Secure SIP and RTP
Firewall and NAT Traversal
Section III: Security Analysis
Basic Security Analysis Toolkit
The Evolution of Threats
Appendices
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.