This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. You learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks. You discover how emerging IETF SIP and media security standards will affect future VoIP deployment, and how end-to-end encryption may be deployed to eventually protect all VoIP calls. The book explains Internet security basics, attack types and methods, and details all the key security aspects of a data and VoIP systems and networks, including identity, authentication, signaling, and media encryption. This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find security approaches and architectures in related applications, such as the World Wide Web, Secure Shell, and the PSTN. A chapter on client and server security discusses general security of Internet hosts in a VoIP system. What's more, the book presents current techniques to combat spam and covers the future problems of spim (spam over instant messaging) and spit (spam over internet telephony).
Voice Over IP is the #1 guide for professionals planning or running VoIP applications. Uyless Black covers every current technical standard, protocol, and interoperability solution.
Cisco Systems, Inc. Modify the current configuration register setting to reflect the way in which you want to load a system image . To do so , change the least significant hexadecimal digit to one of the following : • 0 to load the ...
Principles, Protocols, and Architecture
McGraw-Hill's Cisco IP Library: Unlock the Power of Cisco. Cisco TCP/IP routing professional reference
Describing the protocols that make up the TCP/IP suite, this book provides readers with the background to choose TCP/IP internet hardware and software products to best satisfy their specific requirements.
The practical guide to large-scale networking with OSPF and IS-IS This is the definitive guide to using OSPF and IS-IS protocols in large-scale IP enterprise, carrier, and service provider networks....
Handbook of Computer-communications Standards: The TCP
Here is the step-by-step guide to setting up & using firewall security systems-as well as other products-that UNIX programmers have sorely needed. It not only describes what a firewall can...
Quality of Service is a fast growing area of technology, being driven by the growth of real-time applications such as voice over IP. This book is perfect for you, technical...
Why this guide is important; The hammer and XML; XML and Web services; Web Services and Service-Oriented Architecture; Service-Oriented Architecture and the hammer; The hammer and you; The XML &...