did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780750685276

Security for SIP-Based VoIP Networks : Threat Modeling, Hardening, and Countermeasures

by
  • ISBN13:

    9780750685276

  • ISBN10:

    0750685271

  • Format: Paperback
  • Copyright: 2010-11-30
  • Publisher: Butterworth-Heinemann
  • Purchase Benefits
List Price: $69.95
We're Sorry.
No Options Available at This Time.

Summary

Voice over Internet Protocol (VoIP) is eroding the use of traditional wired phone service in the home and business. The market leader is tripling subscription rates in one year which will continue to rise. As with any new technology now that it is up and running concerns turn to the security of the information being transmitted. Due to the fact that VoIP networks are often implemented over the public Internet they are left open to attacks. Vinay Rao offers a well-structured and in-depth look at VoIP security with an emphasis on SIP-based applications. He will explain protocol fundamentals, review threat analysis and hardening of security. Real-world issues and countermeasures will be discussed extensively resulting in a basic security checklist on which to base future security implementation architecture schemes. *Reduced operating costs, portability, and accessibility of VoIP has created a migration to this technology and a new platform for engineers to secure *General security methodologies thoroughly explained allowing the reader to adapt and evolve problem solving abilities *Learn to secure against identity theft, impersonation, denial or service

Table of Contents

The Fundamentals
Technology Overview
Telecommunications Networks
Data Communications Networks
Cryptography Fundamentals Voice Over IP
A Brief Introduction to VoIP Voice Over IP Architecture
Session Initiation Protocol (SIP)
SIP Fundamentals
Introduction to SIP
SIP Architecture
The SIP-Based VoIP
Ecosystem SIP Associated Protocols and Services Opterational Overview
Securing SIP-Based VoIP
Threat Modeling Threat Assessment SIP Threat Assessment Models
Hardening and Countermeasures Hardening Mechanisms Secure SIP and RTP Firewall and NAT Traversal
Security Analysis
Basic Security Analysis Toolkit
The Evolution of Threats Appendices
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program