Index
 
Operating Systems
Java
Programming Languages
Hardware
Microsoft Technologies
Computer Science
Database
Network
Software Engineering
XML and XSL
Internet
Web Programming
Web Technologies
Physics
Bio-Chemistry
Mathematics
Medical
Redbooks
Unlisted/Miscellaneous

Contact Us

Freebookzone.com | What's New | Missing Link | Feedback

Networking



Book Title : Practical VoIP Security [ILLUSTRATED]
eBook download format(s) : pdf pdf 
ISBN-10 : 1597490601 
ISBN-13 : 978-1-597490-60-3 
Author(s) : Thomas Porter Jan Kanclirz Jr. 
Publisher : Syngress (30 Mar 2006)
Section : Networking
Book Review:

Book Description
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive

· More VoIP phone lines are being installed every day than traditional PBX phone lines

· VoIP is vulnerable to the same range of attacks of any network device

· VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities




add to del.icio.us                 Digg Freebookzone.com!

You may use anyone of the download options


eBook VersionBuy this book from Amazon
Front Cover

Missing Link?, Report It and try these 2 + 1 alternates...
  
     Buy 


Tell a Friend!

Similar Book titles in Networking section:
Introduction to Computer, Internet & Network Systems Security
Cisco - Designing Network Security
Cisco Secure Internet Security Solutions
Router Security Configuration Guide
Cisco Security Specialist's Guide to PIX Firewalls
Managing Cisco Network Security Second Edition
Network Security
Security Engineering: A Guide to Building Dependable Distributed Systems
Wireless LANs A Theoretical and Practical Guide
Switching to VoIP [ILLUSTRATED]
VoIP For Dummies
VoIP For Dummies, Avaya Limited Edition
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Security Essentials


Similar Book titles in Other sections:

Section: Bio-Chemistry
Protein sequence analysis - A practical guide, University of Manchester


Section: CS -> Compilers and Languages
Parsing Techniques - A Practical Guide


Section: CS -> Theory
Crafting a Chip, A Practical Guide to the UofU VLSI CAD Flow
Templates for the Solution of Algebraic Eigenvalue Problems: a Practical Guide


Section: DB -> Postgre SQL
Practical PostgreSQL (O'Reilly Unix)


Section: DB -> SQL
Structured Query Language (SQL) : A Practical Introduction


Section: Computer Hardware
Build Your Own Laptop - An Impractical Guide to Building a Laptop Computer


Section: Internet
Cataloging Internet Resources: A Manual and Practical Guide
Practical UNIX & Internet Security
Maximum Security: A Hacker's Guide to Protecting Your Internet Site and Network
Essential Blogging [ILLUSTRATED]
Computer Security Basics 2nd Edition
Show all..


Section: Advanced Java
Practical Artificial Intelligence Programming in Java


Section: Java Networking
JAVA 2 Network Security


Section: Mathematics
Practical Foundations of Mathematics


Section: Miscellaneous
Handbook of Information Security Management


Section: Microsoft .(dot) net
The .NET Developer's Guide to Windows Security
Improving Web Application Security: Threats and Countermeasures


Section: Microsoft Visual Basic
Practical Standards for Microsoft Visual Basic


Section: GNU/Linux OS
Security in Open Systems
The Linux Administrator's Security Guide
Get Acquainted with Linux Security and Optimization System
Linux Security for Beginners
Practical File System Design - with the BE File System
Show all..


Section: Mac OS X
Maximum Mac OS X Security


Section: C++ Language
Thinking in C++, Volume 2: Practical Programming, Second Edition
Programming with Class: A Practical Introduction to Object Oriented Programming with C++


Section: Other Programming
Practical Common Lisp
Ada in Action: With Practical Programming Examples, Second Edition
A Practical Theory of Programming, Second Edition


Section: Perl Scripting
Practical mod_perl
PERL -- Practical Extraction and Report Language
Practical Perl Programming


Section: Scripting
Practical Programming in Tcl and Tk


Section: Smalltalk
Practical Smalltalk: Using Smalltalk/V


Section: Redbooks Draft
Linux Client Migration Cookbook, Version 2 A Practical Planning and Implementation Guide for Migrating to Desktop Linux
Enterprise Security Architecture using IBM ISS Security Solutions
Enterprise Security Architecture Using IBM Tivoli Security Solutions
WebSphere Application Server V6.1 Security Handbook
Understanding SOA Security Design and Implementation
Show all..


Section: Redbooks
Security Considerations in Notes and Domino 7: Making Great Security Easier to Implement
Communications Server for z/OS V1R7 TCP/IP Implementation, Volume 4: Policy-Based Network Security
Enterprise Security Architecture Using IBM Tivoli Security Solutions
Security for Linux on System z
AIX V6 Advanced Security Features Introduction and Configuration
Show all..


Section: Redpapers
WebSphere Application Server on z/OS and Security Integration
Security with IBM Tivoli Access Manager V6 and IBM WebSphere Application Server V6 on IBM z/OS
J2C Security on z/OS
Java Message Service (JMS) Security on z/OS
z/OS UNIX Security Fundamentals
Show all..


Section: Redpapers Draft
Improving your WebApplication Software Development Life Cycle's Security Posture with IBM Rational AppScan
IBM WebSphere DataPower SOA Appliances Part III: XML Security Guide
JKE Case Study: SOA Security and Management Scenario SOA Scenario
Case Study: SOA Security and Management Scenario SOA Scenario
Integrating WebSphere Service Registry and Repository with Tivoli Security Policy Manager
Show all..


Section: Software Engineering
Task-Centered User Interface Design - A Practical Introduction


Section: Telecommunication
Practical Radio Frequency Handbook


Section: Software Testing
Practical Software Testing: A Process-Oriented Approach


Section: Web Programming
Practical PHP Programming
Secure PHP Development: Building 50 Practical Applications


Section: Web Technology
Practical Guide to SGML/XML Filters


Section: XML, XSL & UML
XSL Concepts and Practical Use
Practical UML: A Hands-On Introduction for Developers


Similar Books from Amazon :


Tell a Friend!


©2008 FreeBookZone.com - Home - Privacy Policy - Program Policy, Terms and Conditions