HOME > 상세정보

상세정보

How to cheat at Voip security [electronic resource]

How to cheat at Voip security [electronic resource]

자료유형
E-Book(소장)
개인저자
Porter, Thomas, PhD. Gough, Michael, 1963-.
서명 / 저자사항
How to cheat at Voip security [electronic resource] / Thomas Porter, Michael Gough.
발행사항
Rockland, Mass. :   Syngress,   2007.  
형태사항
1 online resource (xx, 412 p.) : ill.
ISBN
9780080553535 (electronic bk.) 0080553532 (electronic bk.)
요약
Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
일반주기
Title from e-Book title page.  
내용주기
Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Issued also as a book.  
일반주제명
Internet telephony --Security measures. Computer networks --Security measures.
바로가기
ScienceDirect   URL
000 00000cam u2200205 a 4500
001 000045946866
005 20180718102418
006 m d
007 cr
008 081202s2007 maua ob 001 0 eng d
020 ▼a 9780080553535 (electronic bk.)
020 ▼a 0080553532 (electronic bk.)
035 ▼a (OCoLC)298780513 ▼z (OCoLC)162131593 ▼z (OCoLC)182732370 ▼z (OCoLC)183273687 ▼z (OCoLC)488132285 ▼z (OCoLC)507230094 ▼z (OCoLC)647685167 ▼z (OCoLC)856956991
040 ▼a CtWfDGI ▼b eng ▼e pn ▼c COCUF ▼d N$T ▼d YDXCP ▼d ZCU ▼d IDEBK ▼d E7B ▼d OCLCQ ▼d B24X7 ▼d MERUC ▼d OCLCQ ▼d OCLCO ▼d OCLCQ ▼d OPELS ▼d DKDLA ▼d OCLCQ ▼d COO ▼d OCLCQ ▼d AGLDB ▼d LIV ▼d OCLCQ ▼d 211009
049 ▼a TEFA
050 0 0 ▼a TK5105.8865 ▼b .P67 2007
082 0 0 ▼a 004.69 ▼2 23
084 ▼a 004.69 ▼2 DDCK
090 ▼a 004.69
100 1 ▼a Porter, Thomas, ▼c PhD.
245 1 0 ▼a How to cheat at Voip security ▼h [electronic resource] / ▼c Thomas Porter, Michael Gough.
260 ▼a Rockland, Mass. : ▼b Syngress, ▼c 2007.
300 ▼a 1 online resource (xx, 412 p.) : ▼b ill.
500 ▼a Title from e-Book title page.
504 ▼a Includes bibliographical references and index.
505 0 ▼a Front Cover; How to Cheat at: VoIP Security; Copyright Page; Contents; Chapter 1. Introduction to VoIP Security; Chapter 2. The Hardware Infrastructure; Chapter 3. Architectures; Chapter 4. Support Protocols; Chapter 5. Threats to VoIP Communications Systems; Chapter 6. Confirm User Identity; Chapter 7. Active Security Monitoring; Chapter 8. Logically Segregate Network Traffic; Chapter 9. IETF Encryption Solutions for VoIP; Chapter 10. Skype Security; Chapter 11. Skype Firewall and Network Setup; Appendix A. Validate Existing Security Infrastructure.
520 ▼a Newly converged networks are vulnerable; this book details these attacks and the defense techniques and tools to use against them!
530 ▼a Issued also as a book.
538 ▼a Mode of access: World Wide Web.
650 0 ▼a Internet telephony ▼x Security measures.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a Gough, Michael, ▼d 1963-.
856 4 0 ▼3 ScienceDirect ▼u https://oca.korea.ac.kr/link.n2s?url=http://www.sciencedirect.com/science/book/9781597491693
945 ▼a KLPA
991 ▼a E-Book(소장)

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 중앙도서관/e-Book 컬렉션/ 청구기호 CR 004.69 등록번호 E14003691 도서상태 대출불가(열람가능) 반납예정일 예약 서비스 M

컨텐츠정보

목차

Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols -- Threats to VoIP communications systems -- Confirm user identity -- Active security monitoring -- Logically segregate network traffic -- IETF encryption solutions for VoIP -- Skype security -- Skype firewall and network setup.

관련분야 신착자료

김자미 (2021)