000 | 00000cam u2200205 a 4500 | |
001 | 000045946866 | |
005 | 20180718102418 | |
006 | m d | |
007 | cr | |
008 | 081202s2007 maua ob 001 0 eng d | |
020 | ▼a 9780080553535 (electronic bk.) | |
020 | ▼a 0080553532 (electronic bk.) | |
035 | ▼a (OCoLC)298780513 ▼z (OCoLC)162131593 ▼z (OCoLC)182732370 ▼z (OCoLC)183273687 ▼z (OCoLC)488132285 ▼z (OCoLC)507230094 ▼z (OCoLC)647685167 ▼z (OCoLC)856956991 | |
040 | ▼a CtWfDGI ▼b eng ▼e pn ▼c COCUF ▼d N$T ▼d YDXCP ▼d ZCU ▼d IDEBK ▼d E7B ▼d OCLCQ ▼d B24X7 ▼d MERUC ▼d OCLCQ ▼d OCLCO ▼d OCLCQ ▼d OPELS ▼d DKDLA ▼d OCLCQ ▼d COO ▼d OCLCQ ▼d AGLDB ▼d LIV ▼d OCLCQ ▼d 211009 | |
049 | ▼a TEFA | |
050 | 0 0 | ▼a TK5105.8865 ▼b .P67 2007 |
082 | 0 0 | ▼a 004.69 ▼2 23 |
084 | ▼a 004.69 ▼2 DDCK | |
090 | ▼a 004.69 | |
100 | 1 | ▼a Porter, Thomas, ▼c PhD. |
245 | 1 0 | ▼a How to cheat at Voip security ▼h [electronic resource] / ▼c Thomas Porter, Michael Gough. |
260 | ▼a Rockland, Mass. : ▼b Syngress, ▼c 2007. | |
300 | ▼a 1 online resource (xx, 412 p.) : ▼b ill. | |
500 | ▼a Title from e-Book title page. | |
504 | ▼a Includes bibliographical references and index. | |
505 | 0 | ▼a Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure. |
520 | ▼a Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them! | |
530 | ▼a Issued also as a book. | |
538 | ▼a Mode of access: World Wide Web. | |
650 | 0 | ▼a Internet telephony ▼x Security measures. |
650 | 0 | ▼a Computer networks ▼x Security measures. |
700 | 1 | ▼a Gough, Michael, ▼d 1963-. |
856 | 4 0 | ▼3 ScienceDirect ▼u https://oca.korea.ac.kr/link.n2s?url=http://www.sciencedirect.com/science/book/9781597491693 |
945 | ▼a KLPA | |
991 | ▼a E-Book(소장) |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 중앙도서관/e-Book 컬렉션/ | 청구기호 CR 004.69 | 등록번호 E14003691 | 도서상태 대출불가(열람가능) | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup.