Jump to content
Nytro

Securing VoIP Networks

Recommended Posts

894ee8ff.jpg

Tomorrow, all communications will happen over IP. In the past, telecom operators handled most communications, and the main business for them was voice communication. In reality, almost all last-mile communications today still happen over the conventional telecom infrastructure. The backbone of the Internet has been going through a fast transition to faster and faster fiber optics and digital data transfer. The era of analog communications has been over for some time already.

Today, people speak of Voice over IP, but a better name for the Next Generation Networks is Everything over IP (EoIP). And all of that communication will be wireless. But what does that have to do with the topic of this book? It means the world has to finally wake up to the security of the communications networks.

To be secure, you have to understand that wireless networks are always open. While in traditional telephone networks all the switches were kept behind locked doors and all the cabling was protected, in wireless technology there are no cables and everyone has access to wireless access points. One compromised infrastructure component, and the entire network is compromised. One virus-contaminated access device, and everyone in the network will be contaminated.

This book is built around voice as the application to be secured, but the principles apply to any communications. Studying this book should be obligatory to all students in computer engineering and computer science, not only due to its content and deep understanding of VoIP security, but also to allow them to learn how to apply the best practices in other fields, no matter what their future field of study will be. The key to learning is not only studying things and memorizing the various topics, but learning how to apply the best practices of other fields in your own. Combining the best practices of traditional telecommunications, e-mail, and the web into new next-generation technologies is essential to be able to build reliable and usable communication technologies. Voice over IP is potentially the killer application, destroying conventional communication networks and creating a new IP-based communication infrastructure.

TABLE OF CONTENT:

Chapter 01 - Introduction

Chapter 02 - VoIP Architectures and Protocols

Chapter 03 - Threats and Attacks

Chapter 04 - VoIP Vulnerabilities

Chapter 05 - Signaling Protection Mechanisms

Chapter 06 - Media Protection Mechanisms

Chapter 07 - Key Management Mechanisms

Chapter 08 - VoIP and Network Security Controls

Chapter 09 - A Security Framework for Enterprise VoIP Networks

Chapter 10 - Provider Architectures and Security

Chapter 11 - Enterprise Architectures and Security

Download (4,9Mb):

http://rapidshare.com/files/77713998/secvoipnet.rar

Mirror:

http://www.megaupload.com/?d=Q1DEEN3X

Password:

www.ebooksdb.com

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...