Text
Securing VoIP networks: threats, vulnerabilities, and countermeasures
Contents:
Ch. 1. Introduction
Ch. 2. VoIP architectures and protocols
Ch. 3. Threats and attacks
Ch. 4. VoIP vulnerabilities
Ch. 5. Signaling protection mechanisms
Ch. 6. Media protection mechanisms
Ch. 7. Key management mechanisms
Ch. 8. VoIP and network security controls
Ch. 9. A security framework for enterprise VoIP networks
Ch. 10. Provider architectures and security
Ch. 11. Enterprise architectures and security.
No other version available