Skip to content

How to Cheat at VoIP Security

Best in textbook rentals since 2012!

ISBN-10: 1597491691

ISBN-13: 9781597491693

Edition: 2007

Authors: Thomas Porter CISSP CCNP CCDA CCS, Michael Gough

List price: $54.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Voice over Internet Protocol (VoIP) is telephony over the internet. More than 3.1 million VoIP phone lines have been installed worldwide with installations of traditional PBX phone systems decreased by 36% in 2004 while VoIP installations increased by 54%. All of these newly installed VoIP phone lines and handsets are accessible via the internet and vulnerable to malicious attack as well as spam. This book covers exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. Just enough coverage of products like Google Talk and Skype and IM and P2P…    
Customers also bought

Book details

List price: $54.95
Copyright year: 2007
Publisher: Elsevier Science & Technology Books
Publication date: 6/28/2007
Binding: Paperback
Pages: 432
Size: 7.00" wide x 9.00" long x 1.09" tall
Weight: 1.540
Language: English

Thomas Porter, Ph.D. (CISSP, CCNP, CCDA, CCSE/SA, ACE, IAM) served as the first Chief Information Security Officer (CISO) at Avaya, and is currently the Lead Security Architect for Business Communication Consulting and Director of IT Security for the FIFA 2006 World Cup in Germany He is a past member of the IP Security Protocol Working Group, and the Executive Telecommunications Board of the State University of New York. He is currently a member of the IEEE, and OASIS (Organization for the Advancement of Structured Information Standards).

Introduction to VoIP security
The hardware infrastructure
Architectures
Support protocols
Threats to VoIP communications systems
Confirm user identity
Active security monitoring
Logically segregate network traffic
IETF encryption solutions for VoIP
Skype security
Skype firewall and network setup
Validate existing security infrastructure
The IP multimedia subsystem : true converged communications
Regulatory compliance