Understanding Voice over Ip Security (Artech House Telecommunications Library)

[Alan B. Johnston, David M. Piscitello] ↠ Understanding Voice over Ip Security (Artech House Telecommunications Library) ✓ Download Online eBook or Kindle ePUB. Understanding Voice over Ip Security (Artech House Telecommunications Library) CeSinge said In depth, theoretical, but really security. This is a really good, but theoretical, in depth book on the fairly new subject of VoIP security. It is in places deep technical - not the kind of how-to-approach-the-problem type of book, but really describing in detail how things work. The reason why I picked this book was twofold. One, it really focuses on VoIP *security* - as opposed to many books on the subject that handle security or VoIP, with only one or two chapters on VoIP + secu

Understanding Voice over Ip Security (Artech House Telecommunications Library)

Author :
Rating : 4.18 (700 Votes)
Asin : 1596930500
Format Type : paperback
Number of Pages : 276 Pages
Publish Date : 2014-05-17
Language : English

DESCRIPTION:

in electrical engineering from Lehigh University. He holds a B.E.(Hons) in electrical and electronic engineering from the University of Melbourne, Australia and a Ph.D. Alan B. He is a co-author of the SIP specification RFC 3261 and several other SIP-related RFCs. Johnston is a distinguished technical member at MCI and an adjunct assistant professor of electrical engineering at Washington University in St. Louis.

CeSinge said In depth, theoretical, but really security. This is a really good, but theoretical, in depth book on the fairly new subject of VoIP security. It is in places deep technical - not the kind of how-to-approach-the-problem type of book, but really describing in detail how things work. The reason why I picked this book was twofold. One, it really focuses on VoIP *security* - as opposed to many books on the subject that handle security or VoIP, with only one or two chapters on VoIP + security. Two, it is in-depth and detailed.Concerning the `in-depth' part, clearly it is. The style is dense, compact, almost academic. No pages of listings or screenshots - just a factual approach: I p. "A detailed overview of VOIP and security" according to Marcus J. Ranum. VOIP - the next big thing in network communication? Or a security disaster in progress? My money's on the latter, so I was happy to be able to read through this book. It has a lot of useful background material on security and security technology, and then ties it into VOIP and the current implementations of the VOIP suite. The authors don't exactly come out and say it but the situation for VOIP looks a bit grim - security kludged on as an afterthought largely by layering atop TLS and the non-existent non-functioning public key infrastructure.I found the book to be interesting an informative, and will recommend it as a reference to an. Dr Anton Chuvakin said Comprehensive and in-depth book!. Now, VOIP security has been talked about for a few years; it started even before organizations started to deploy VOIP in greater numbers. Many folks like to say that "VOIP security is a disaster," but usually they don't explain how or why.Dave Piscitello does. In his excellent book ""Understanding Voice over IP Security" he provides excellent coverage of both VOIP technology basics as well as internet security fundamentals (which are admittedly more useful to the security beginners) Then he fuses the above information into a comprehensive coverage of VOIP security issues, from protocols to call fraud.VOIP and NAT? Security analysis o

end-to-end security in terms of VoIp systems. You discover how emerging Ietf Sip and media security standards will affect future VoIp deployment, and how end-to-end encryption may be deployed to eventually protect all VoIp calls. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the Pstn. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIp systems and networks, including identity, authentication, signaling, and media encryption. You learn how to design and implement secure VoIp ne

He holds a B.E.(Hons) in electrical and electronic engineering from the University of Melbourne, Australia and a Ph.D. About the Author Alan B. Johnston is a distinguished technical member at MCI and an adjunct assistant professor of electrical engineering at Washington University in St. . in electrical engineering from Lehigh University. He is a co-author of the SIP specification RFC 3261 and several other SIP-related RFCs. Louis

OTHER BOOK COLLECTION