Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todayas complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.... 250 cracking, 226 IP phones, 295 PBX system, 248a49 token-based authentication, 250 PBX security best practices, 246a52 accounts ... 207 vulnerabilities, combating, 249a52 See also PBX security best practices Probability Density Function (PDF), 17 Propagation delays, ... standardization, 26 word format, 21 Quality of Service (QoS), 153a68 built-in, 162 configuration, 166a 68 deployment 394 Index.
|Title||:||Voice over Internet Protocol (VoIP) Security|
|Author||:||James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM|
|Publisher||:||Digital Press - 2005-01-19|