How to cheat at Voip security

The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies us...

Descripción completa

Detalles Bibliográficos
Autor principal: Porter, Thomas, PhD (-)
Otros Autores: Gough, Michael
Formato: Libro electrónico
Idioma:Inglés
Publicado: Rockland, MA : Syngress c2007.
Edición:1st ed
Colección:How to Cheat
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627086906719
Descripción
Sumario:The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Unde
Notas:Includes index.
Descripción Física:1 online resource (433 p.)
ISBN:9781281060266
9786611060268
9780080553535