Securing VoIP - 1st Edition - ISBN: 9780124170391, 9780124171220

Securing VoIP

1st Edition

Keeping Your VoIP Network Safe

Authors: Regis J. (Bud) Bates
eBook ISBN: 9780124171220
Paperback ISBN: 9780124170391
Imprint: Syngress
Published Date: 17th November 2014
Page Count: 220
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
38.95
27.27
27.27
27.27
27.27
27.27
31.16
31.16
49.95
34.97
34.97
34.97
34.97
34.97
39.96
39.96
30.99
21.69
21.69
21.69
21.69
21.69
24.79
24.79
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

Key Features

  • Explains the business case for securing VoIP Systems
  • Presents hands-on tools that show how to defend a VoIP network against attack.
  • Provides detailed case studies and real world examples drawn from the authors’ consulting practice.
  • Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
  • Covers the security policies and procedures that need to be in place to keep VoIP communications safe.

Readership

Information security professionals, system administrators. Security managers.

Table of Contents

  • Technical editor biography
  • About the author
  • Acknowledgments
  • Chapter 1: Introduction
    • Abstract
    • Securing Voice over Internet Protocol (VoIP): keeping your network safe
    • Summary
  • Chapter 2: Policies
    • Abstract
    • What is the problem?
    • The call control channel – hijacking
    • Softphone issues
    • Denial-of-service attacks
    • Security concerns
    • Security policy needs
    • Vulnerability detection and auditing
    • Is the system vulnerable?
  • Chapter 3: VoIP virtual private networks (VPNs)
    • Abstract
    • Virtual private networks (VPNs) and encryption
    • Summary
  • Chapter 4: Cryptography solutions
    • Abstract
    • Cryptography solutions
    • Summary
  • Chapter 5: Authentication
    • Abstract
    • Authentication defined
    • Summary
  • Chapter 6: Other protocols SRTP, ZRTP, and SIPS
    • Abstract
    • Other protocols
    • Summary
  • Chapter 7: The business case for securing VoIP
    • Abstract
    • Before we start
    • Summary
  • Chapter 8: Approaches to VoIP security
    • Abstract
    • Before we start
    • Summary
  • Chapter 9: Final thoughts
    • Abstract
    • Before we start
    • Summary
  • Index

Details

No. of pages:
220
Language:
English
Copyright:
© Syngress 2015
Published:
Imprint:
Syngress
eBook ISBN:
9780124171220
Paperback ISBN:
9780124170391

About the Author

Regis J. (Bud) Bates

Regis J. "Bud" Bates has more than 30 years of experience in Telecommunications and Information Services and has long been considered a technology "Guru." He currently contributes to these fields as an author, consultant, course developer and teacher. As an Author, Bud has written numerous books on the technologies, including "Voice and Data Communications Handbook”, and the “Broadband Telecom Handbook”. As a Consultant, with clients spanning the range of Fortune 100-500 companies, Bud has been involved in the design of major voice and data networks. His innovative ideas in implementation have been profiled in trade journals and magazines. Many of his projects deal with multiple sites and countries using Frame Relay and ATM architectures. As a Teacher, Bud has develops and conducts various public and in-house seminars ranging from a managerial overview to very technical hands-on classes on Voice over IP, WiFi Networking, WIMAX networking, DWDM and IPv6. In the recent past he has focused much of his development and training activities on the convergence of three key areas;

VoIP,Security and WiFi.

Affiliations and Expertise

TC International Consulting, Inc., Phoenix, AZ

Reviews

"...recommended both to administrators and network engineers and staff with leadership responsibilities in communications departments...readers will better understand the security risks of VoIP systems and the role of security policies and methods...a benchmark for the practice of securing VoIP communications." --Computing Reviews

"...a well-written, varied and informative treatment of the subject. It has the potential to appeal to a wide range of business and technical readers alike. I can award the book 8 out of 10..." --BCS.org, 2015