Book description
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
- Explains the business case for securing VoIP Systems
- Presents hands-on tools that show how to defend a VoIP network against attack.
- Provides detailed case studies and real world examples drawn from the authors’ consulting practice.
- Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
- Covers the security policies and procedures that need to be in place to keep VoIP communications safe.
Table of contents
- Cover
- Title page
- Table of Contents
- Copyright
- Technical editor biography
- About the author
- Acknowledgments
- Chapter 1: Introduction
- Chapter 2: Policies
- Chapter 3: VoIP virtual private networks (VPNs)
- Chapter 4: Cryptography solutions
- Chapter 5: Authentication
- Chapter 6: Other protocols SRTP, ZRTP, and SIPS
- Chapter 7: The business case for securing VoIP
- Chapter 8: Approaches to VoIP security
- Chapter 9: Final thoughts
- Index
Product information
- Title: Securing VoIP
- Author(s):
- Release date: November 2014
- Publisher(s): Syngress
- ISBN: 9780124171220
You might also like
book
How to Cheat at VoIP Security
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Securing Cisco IP Telephony Networks
The real-world guide to securing Cisco-based IP telephony applications, devices, and networks Cisco IP telephony leverages …
book
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing …