Switching to Digital TV: Everything You Need to Know Switching to Digital TV: Everything You Need to Know

Switching to Digital TV: Everything You Need to Know

    • 3,99 €
    • 3,99 €

Beschreibung des Verlags

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

Voice over IP Security

Security best practices derived from deep analysis of the latest VoIP network threats

Patrick Park

VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). Another type of security issue is how to implement lawful interception within complicated service architectures according to government requirements.

Voice over IP Security focuses on the analysis of current and future threats, the evaluation of security products, the methodologies of protection, and best practices for architecture design and service deployment. This book not only covers technology concepts and issues, but also provides detailed design solutions featuring current products and protocols so that you can deploy a secure VoIP service in the real world with confidence.

Voice over IP Security gives you everything you need to understand the latest security threats and design solutions to protect your VoIP network from fraud and security incidents.

Patrick Park has been working on product design, network architecture design, testing, and consulting for more than 10 years. Currently Patrick works for Cisco® as a VoIP test engineer focusing on security and interoperability testing of rich media collaboration gateways. Before Patrick joined Cisco, he worked for Covad Communications as a VoIP security engineer focusing on the design and deployment of secure network architectures and lawful interception (CALEA). Patrick graduated from the Pusan National University in South Korea, where he majored in computer engineering.

Understand the current and emerging threats to VoIP networks

Learn about the security profiles of VoIP protocols, including SIP, H.323, and MGCP

Evaluate well-known cryptographic algorithms such as DES, 3DES, AES, RAS, digital signature (DSA), and hash function (MD5, SHA, HMAC)

Analyze and simulate threats with negative testing tools

Secure VoIP services with SIP and other supplementary protocols

Eliminate security issues on the VoIP network border by deploying an SBC

Configure enterprise devices, including firewalls, Cisco Unified Communications Manager, Cisco Unified Communications Manager Express, IP phones, and multilayer switches to secure VoIP network traffic

Implement lawful interception into VoIP service environments

This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged

networks, and implement network

solutions for increased productivity.

Category: Networking—IP Communication

Covers: VoIP Security

GENRE
Computer und Internet
ERSCHIENEN
2008
7. September
SPRACHE
EN
Englisch
UMFANG
96
Seiten
VERLAG
Que
ANBIETERINFO
Pearson Education Limited
GRÖSSE
1,9
 MB
Cutting Through the Static (Business) Cutting Through the Static (Business)
2008
The Not too Technical Home Theater Handbook: 2nd Edition The Not too Technical Home Theater Handbook: 2nd Edition
2011
Digital Converters Keep the Old Tube TV Useable ... As Long As You Don't Mind Hitting the Zoom Button (Business) Digital Converters Keep the Old Tube TV Useable ... As Long As You Don't Mind Hitting the Zoom Button (Business)
2008
Cord Cutting For Dummies Cord Cutting For Dummies
2021
TiVo Competition: German Market Analyses TiVo Competition: German Market Analyses
2009
The IPTV Handbook - Everything You Need To Know About IPTV The IPTV Handbook - Everything You Need To Know About IPTV
2016
Sams Teach Yourself Spotify in 10 Minutes Sams Teach Yourself Spotify in 10 Minutes
2012
The Complete Idiot's Guide to Music History The Complete Idiot's Guide to Music History
2008
Using Google Maps and Google Earth Using Google Maps and Google Earth
2011
Using Microsoft Word 2010 Using Microsoft Word 2010
2009
Connective Action and the Rise of the Far-Right Connective Action and the Rise of the Far-Right
2025
Music Theory Note by Note Music Theory Note by Note
2024