Hacking VoIP Protocols, Attacks, and Countermeasures

Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators mu...

Descripción completa

Detalles Bibliográficos
Autor principal: Dwivedi, Himanshu (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: San Francisco : No Starch Press 2008.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627612406719
Descripción
Sumario:Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses again
Notas:Description based upon print version of record.
Descripción Física:1 online resource (236 p.)
ISBN:9781593273095